<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC7011 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7011.xml">
<!ENTITY RFC8986 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8986.xml">
<!ENTITY RFC9315 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9315.xml">
]>


<rfc ipr="trust200902" docName="draft-irtf-nmrg-ai-challenges-05" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Coupling AI and network management">Research Challenges in Coupling Artificial Intelligence and Network Management</title>

    <author fullname="Jérôme François">
      <organization>University of Luxembourg and Inria</organization>
      <address>
        <postal>
          <street>6 Rue Richard Coudenhove-Kalergi</street>
          <city>Luxembourg</city>
          <country>Luxembourg</country>
        </postal>
        <email>jerome.francois@uni.lu</email>
      </address>
    </author>
    <author fullname="Alexander Clemm">
      <organization>Independent</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>ludwig@clemm.org</email>
      </address>
    </author>
    <author fullname="Dimitri Papadimitriou">
      <organization>3NLab Belgium Reseach Center</organization>
      <address>
        <postal>
          <city>Leuven</city>
          <country>Belgium</country>
        </postal>
        <email>papadimitriou.dimitri.be@gmail.com</email>
      </address>
    </author>
    <author fullname="Stenio Fernandes">
      <organization>Central Bank of Canada</organization>
      <address>
        <postal>
          <country>Canada</country>
        </postal>
        <email>stenio.fernandes@ieee.org</email>
      </address>
    </author>
    <author fullname="Stefan Schneider">
      <organization>Digital Railway (DSD) at Deutsche Bahn</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>stefanbschneider@outlook.com</email>
      </address>
    </author>

    <date year="2025" month="March" day="18"/>

    
    <workgroup>Internet Research Task Force</workgroup>
    <keyword>network management</keyword> <keyword>artificial intelligence</keyword> <keyword>machine learning</keyword>

    <abstract>


<t>This document is intended to introduce the challenges to overcome when Network Management (NM) problems may require coupling with Artificial Intelligence (AI) solutions. On the one hand, there are many difficult problems in NM that to this date have no good solutions, or where any solutions come with significant limitations and constraints. Artificial Intelligence may help produce novel solutions to those problems. On the other hand, for several reasons (computational costs of AI solutions, privacy of data), distribution of AI tasks became primordial. It is thus also expected that networks are operated efficiently to support those tasks.</t>

<t>To identify the right set of challenges, the document defines a method based on the evolution and nature of NM problems. This will be done in parallel with advances and the nature of existing solutions in AI in order to highlight where AI and NM have been already coupled together or could benefit from a higher integration. So, the method aims at evaluating the gap between NM problems and AI solutions. Challenges are derived accordingly, assuming solving these challenges will help to reduce the gap between NM and AI.</t>

<t>This document is a product of the Network Management Research Group (NMRG) of the Internet Research Task Force (IRTF).  This document reflects the consensus of the research group.  It is not a candidate for any level of Internet Standard and is published for informational purposes.</t>



    </abstract>



  </front>

  <middle>


<section anchor="intro"><name>Introduction</name>

<t>The functional scope of Network Management (NM) is very large, ranging from monitoring to accounting, from network provisioning to service diagnostics, from usage accounting to security. The taxonomy defined in <xref target="Hoo18"/> extends the traditional Fault, Configuration, Accounting, Performance, Security (FCAPS) domains by considering additional functional areas but above all by promoting additional views. For instance, network management approaches can be classified according to the technologies, methods or paradigms they will rely on. Methods include common approaches as for example mathematical optimization or queuing theory but also techniques which have been widely applied in last decades like game theory, data analysis, data mining and machine learning. In management paradigms, autonomic and cognitive management are listed. As highlighted by this taxonomy, the definition of automated and more intelligent techniques has been promoted to support efficient network management operations. Research in NM and more generally in networking has been very active in the area of applied ML <xref target="Bou18"/> and allows progresses in different domains such as network security <xref target="Ke23"/>, Software-Defined Networks (SDN) <xref target="Ham21"/>, vehicular network <xref target="Tan21"/>. This large adoption has led to a strong interlinkage between networks and AI, laying the foundation of future networks such as 6G or B5G networks expected to be AI-native <xref target="Sha25"/>.</t>

<t>However, for maintaining network operational in pre-defined safety bounds, NM still heavily relies on established procedures. Even after several cycles of adding automation, these procedures are still mostly fixed and set offline in the sense that the exact control loops and all possible scenarios are defined in advance. They are so mostly deterministic by nature or at least with sufficient safety margin. Obviously, there have been a lot of propositions to make network smarter or intelligent with the use of Machine Learning (ML) but without large adoption for running real networks because it changes the paradigms towards stochastic methods.</t>

<t>ML includes regression analysis, statistical learning (SVM and variants), deep learning (ANN and variants), Reinforcement Learning (RL), Large Language Models (LLMs), etc. It is a sub-area of Artificial Intelligence (AI) that concentrates the focus nowadays but AI encompasses other areas including knowledge representation, inductive logic programming, inference rule engine or by extension the techniques that allow to observe and perform actions on a system.</t>

<t>It is thus legitimate to question if ML or AI in general could be helpful for NM in regard to practical deployment. This question is actually tight with the problems the NM aims to address. Independently of NM, ML-based solutions were introduced to solve one type of problems in an approximate way which are very complex in nature, i.e. when finding an optimal solution is not possible (in polynomial time). This is the case for NP-hard problems. In those cases, solutions typically rely on heuristics that may not yield optimal results, or algorithms that run into issues with scalability and the ability to produce timely results due to the exponential search space. In NM, those problems exist: allocation of resources in case of Service Function Chaining (SFC) or network slicing among others are recent examples which have gained interest in our community with SDN. Many propositions consist of modelling the optimization problem as a MILP (Mixed-Integer Linear Programming) and solve it by means of heuristics to reach a satisfactory trade-off between solution quality (gap to the optimal solution) - computation time and model size/dimensionality. Hence, ML is recognized to be well adapted to progress on this type of problem <xref target="Kaf19"/>.</t>

<t>However, all computational problems of NM are not NP-hard. Due to real-time constraints, some involve very short control loops that require both rapid decisions and the ability to rapidly adapt to new situations and different contexts. So, even in that case, time is critical, and approximate solutions are usually more acceptable.  Again, it is where AI can be beneficial. Actually, expert systems are AI systems <xref target="Ste92"/> but this kind of rule-based systems are not designed to scale with the volume and heterogeneity of data we can collect in a network today. In contrast, ML is more efficient to automatically learn abstract representations of the rules, which can be eventually updated.</t>

<t>On one hand, another type of common problem in NM is classification. For instance, classifying network flows is helpful for security purposes to detect attack flows, to differentiate QoS among the different flows (e.g. real-time streams which need to be prioritized), etc. On the other hand, ML-based classification algorithms have been widely used with satisfactory results when properly applied leading to their application in commercial products. There are many algorithms including decision trees, Support Vector Machine (SVM) or (deep) Neural Networks (NNs) which have been to be proven efficient in many areas and notably for image and natural language processing.</t>

<t>Finally, many problems also still rely on humans in the loop: from support issues such as dealing with trouble tickets to planning activities for the roll-out of new services. This creates operational bottlenecks and is often expensive and error prone. This kind of tasks could be either automated or guided by an AI system to avoid individual human bias. It is worth noting that ML relying on training data generated by human can also indirectly suffer from a collective human bias. Indeed, the balance between human resources and the complexity of problems to deal with is very imbalanced and this will continue to increase due to the evolving size of networks, heterogeneity of devices, services, etc. Hence, human-based procedures tend to be simple in comparison to the problems to solve or time-consuming. Notable examples are in security where the network operator should defend against potential unknown threat.</t>

<t>Actually, all aforementioned problems are exacerbated by the situation of more complex networks to operate on many dimensions (users, devices, services, connections, etc.). Therefore, AI is expected to enable or simplify the solving of those problems in real networks in the near future <xref target="czb20"/> <xref target="Yan20"/> because those would require reaching unprecedented levels of performance in terms of throughput, latency, mobility, security, etc.</t>

</section>
<section anchor="acronyms"><name>Acronyms</name>

<t><list style="symbols">
  <t>AI: Artificial Intelligence</t>
  <t>CNN: Convolutional Neural Network</t>
  <t>FL: Federated Learning</t>
  <t>GAN: Generative Adversarial Network</t>
  <t>GNN: Graph Neural Network</t>
  <t>IBN: Intent-Based Networking</t>
  <t>LLM: Large Language Model</t>
  <t>LSTM: Long Short-Term Memory</t>
  <t>MAE: Mean Absolute Error</t>
  <t>ML: Machine Learning</t>
  <t>MILP: Mixed-Integer Linear Programming</t>
  <t>MLP: Multilayer Perceptron</t>
  <t>MSE: Mean Squared Error</t>
  <t>NM: Network Management</t>
  <t>RL: Reinforcement Learning</t>
  <t>SDN: Software-Defined Networks</t>
  <t>SFC: Service Function Chaining</t>
  <t>SVM: Support-Vector Machine</t>
  <t>VNF: Virtual Network Function</t>
</list></t>

</section>
<section anchor="pbNM"><name>Difficult problems in network management</name>

<t>As mentioned in introduction, problems to be tackled in NM tend to be complex and exhibit characteristics that make them good candidates for AI-based solutions:</t>

<t><list style="symbols">
  <t>C1: A very large solution space, combinatorically exploding with the size of the problem domain. This makes it impractical to explore and test every solution (again NP-hard problems).</t>
  <t>C2: Uncertainty and unpredictability along multiple dimensions, including the context in which the solution is applied, behaviour of users and traffic, lack of visibility into network state, etc.  In addition, many networks do not exist in isolation but are subjected to myriads of interdependencies, some outside their control.  Accordingly, there are many external parameters that affect the efficiency of the solution to a problem and that cannot be known in advance: user activity, interconnected networks, etc.</t>
  <t>C3: The need to provide answers (i.e. compute solutions, deliver verdicts, make decisions) in constrained or deterministic time. In many cases, the context changes dynamically and decisions need to be made quickly to be useful.</t>
  <t>C4: Data-dependent solutions. To solve a problem accurately, it can be necessary to rely on large volumes of data and to deal with issues that range from data heterogeneity to incomplete data to general challenges of dealing with high data velocity.</t>
  <t>C5: Need to be integrated with existing automatic and human processes.</t>
  <t>C6: Solutions must be cost-effective as resources (bandwidth, CPU, human, etc.) can be limited, notably when part of processing is distributed at the network edge or within the network.</t>
</list></t>

<t>Many decision/optimization problems are affected by multiple criteria. Below is a non-exhaustive list of complex NM problems for which AI and/or non-AI-based approaches have been proposed:</t>

<t><list style="symbols">
  <t>Computation of optimal paths: Packet forwarding is not always based on traditional routing protocols with least cost routing, but on computation of paths that are optimized for certain criteria - for example, to meet certain level objectives, to result in greater resilience to balance utilization, to optimize energy usage, etc.  Many of those solutions can be found in SDN, where a controller or path computation element computes paths that are subsequently provisioned across the network.  However, such solutions generally do not scale to millions of paths (C1) and cannot be recomputed in sub-second time scales (C3) to take into account dynamically changing network conditions (C2). To compute those paths, operations research techniques have been extensively used in literature along with AI methods <xref target="Lop20"/>. Mobility and dynamicity are two conditions that make the problem of computing optimal paths even harder. Hence, adaptive routing based on RL has been proposed as it allows an agent to promptly react to topological changes <xref target="Sin22"/>. As such, this problem can be considered as close to big data problems with some of the different Vs: volume, velocity, variety, value…</t>
  <t>Classification of network traffic: Without loss of generality a common objective of network monitoring for operators is to know the type of traffic going through their networks (web, streaming, gaming, VoIP). Such a task analyses data (C4) which can vary over time (C2) except in very particular scenarios like industrial isolated networks. However, the output of the classification technique is time-constrained only in specific cases where fast decisions must be made, for example to reroute traffic. Simple identification based on IANA-assigned TCP/UDP ports numbers were sufficient in the past. However, with applications using dynamic port numbers, signature techniques can be used to match packet payload <xref target="Sen04"/>. To handle applications now encapsulated in encrypted web or VPN traffic, various ML-based approaches have been thus adopted <xref target="Bri19"/><xref target="Naj24"/><xref target="Wan24"/><xref target="Ake24"/> including LLMs <xref target="Gin24"/>.</t>
  <t>Network diagnostics: Disruptions of networking services can have many causes and thus can rely on analysing many sources of data (C4). Identifying the root causes is of high importance, so that repair actions can address them versus just working around the symptoms. Such repair actions may involve human actions (C5). Further complicating the matter are scenarios in which disruptions are not complete but involve only a degradation of service level, and where disruptions are intermittent, not reproducible, and hard to predict.  Artificial intelligence techniques can offer promising solutions. Especially, anticipation of faults is of paramount of importance and will lead to the development of predictive maintenance in future networks<xref target="Mut24"/>.</t>
  <t>Network observability: having deeper insights of network status can rely on monitoring techniques to gather data from various sources. A major issue is to aggregate all these data in a valuable format <xref target="Zha21"/>. When it is not directly used to automate some actions, the aggregation of the data needs to be presented in an interpretable manner to human operators. In this area, visualisation techniques are helpful and also rely on AI techniques to provide the best outputs by reducing the number of dimensions (C4) and adapting the visualisation of data for human-handled processes (C5) <xref target="Ami24"/>.</t>
  <t>Intent-Based Networking (IBN): Roughly speaking, IBN refers to the ability to manage networks by articulating desired outcomes without the need to specify a course of <xref target="RFC9315"/>.  The ability to determine such courses of actions, in particular with multiple interdependencies, conflicting goals, large scale, and highly complex and dynamic environments is a huge and largely unsolved challenge (C1, C2, C3). As an illustration, a major problem with intent is to interpret them correctly knowing that different intent formats have been proposed including natural language. Without good interpretation of the intent, i.e. the expected outcomes, the derived actions will not be adequate. In case the intent is correctly interpreted, a major problem is to find concrete solutions to realize the intents which implicitly needs to optimize the actions to be taken. Artificial Intelligence techniques can be of help here in multiple ways, from accurately classifying dynamic context to determine matching actions to reframing the expression of intent as a game that can be played (and won) using artificially intelligent techniques.  As an example, LossLeaP even goes further by trying to predict the gap between a targeted objective and the predicted impact of the intent realization <xref target="Col22"/>.</t>
  <t>VNF (Virtual Network Function) placement and SFC (Service Function Chain) design: VNFs need to be placed on physical resources and SFCs designed in an optimized manner to minimize the use of networking resources and energy (C1,C6). As it is known to be a NP hard problem, many heuristic- or machine learning based approaches have been proposed. The VNF paradigm actually emerges alongside 5G networking and orchestration methods <xref target="Att23"/>.</t>
  <t>Smart admission control to avoid congestion and oversubscription of network resources: Admission control needs to be set up to ensure service levels are optimized in a manner that is fair and aligned with application needs, congestion avoided, or its effects mitigated (C6). This field of research has notably been extended to the context of network slicing <xref target="Vin21"/><xref target="Sul23"/>.</t>
</list></t>

</section>
<section anchor="hlchallenges"><name>High-level challenges in adopting AI in NM</name>

<t>As shown in the previous section, AI techniques are good candidates for the difficult NM problems. There have been many propositions but still most of them remain at the level of prototypes or have been only evaluated with simulation and/or emulation. It is thus questionable why our community investigates much research in this direction but has not widely adopted those solutions to operate real networks. There are different obstacles.</t>

<t>First, AI advances have been historically driven by the image/video, natural language and signal processing communities as well as robotics for many decades. As a result, the most impressive applications are in this area including recently the generalization of home assistants, chatbots or the large progress in autonomous vehicles. However, the network experts have been focused on building the Internet, in particular designing protocols to make the world interconnected and with always better performance and services. This trend continues today with the 5G networks in deployment and beyond 5G under definition. Hence, AI was not the primary focus even if increased network automation calls for AI and ML solutions. However, AI is now considered as a core enabler for the future 6G networks which are sometimes qualified as AI-native networks <xref target="Sha25"/>.</t>

<t>While we can see major contributions in AI-based solutions for networking over more than two decades, only a fraction of the community was concerned by AI at that time. Progress as a whole, from a community perspective, was so limited and compensated by relying on the development of AI in the communities as mentioned earlier. Even if our problems share some commonalities, for example on the volume of data to analyse, there are differences: data types are completely different, networks are by nature heavily distributed, etc. If problems are different, they should require distinct solutions or at least in-depth adaptation. In a nutshell, network-tailored AI was overlooked and leads to a first set of challenges described in <xref target="AItechniques"></xref>.</t>

<t>Second, many AI techniques require data representative enough.  For example, (deep) learning techniques mostly rely on having vectors of (real) numbers as input which fits some metrics (packet/byte counts, latency, delays, etc) but needs some adjustment for categorical (IP addresses, port numbers, etc) or topological features. Conversions are usually applied using common techniques like one-hot encoding or by coarse-grained representations <xref target="Sco11"/>. However, more advanced techniques can be proposed to embed representation of network entities rather than pure encoding as illustrated in <xref target="Rin17"/><xref target="Evr19"/><xref target="Sol20"/>.</t>

<t>Besides, AI techniques that involve analysis of networking data can also lead to the extraction of sensitive and personally identifiable information, raising potential privacy concerns and concerns regarding the potential for abuse. Actually, this is a common and known problem that applies to many application domains <xref target="Liu22"/>. For example, AI techniques used to analyse encrypted network traffic with the legitimate goal to protect the network from intrusions and illegitimate attack traffic could be used to infer information about network usage and interactions of network users <xref target="Hoa21"/>.  Intelligent data analysis and the need to maintain privacy are in many ways contradictory in nature, resulting in an arms race.  Similarly, training ML solutions on real network data is often preferable over using less-realistic synthetic data sets <xref target="Liu22b"/>. However, network data may contain private or sensitive data, the sharing of which may be problematic from a privacy standpoint and even result in legal exposure. The challenge concerns thus how to allow AI techniques to perform legitimate network management functions and provide network owners with operational insights into what is going on in their networks, while prohibiting their potential for abuse for other (illegitimate) purposes.  Challenges related to network data as input to ML algorithms is detailed in <xref target="netData"></xref>.</t>

<t>Finally, networks are already operated thanks to (semi-)automated procedures involving many resources which are synchronized with management or orchestration tools. Adding AI supposes so a seamless integration within pre-existing processes. Although the goal of these procedures might be solely to provide relevant information to operators through alerts or dashboards in case of monitoring applications, this can be defined to trigger actions on the different resources, which can be local or remote. The use of AI or any other approaches to derive NM actions adds further constraint on them, especially regarding time constraints <xref target="Liu21"/> and synchronization to maintain a coherence over a distributed system.</t>

<t>A related challenge concerns the fact that to be deployed, a solution needs to provide a technical solution but also be acceptable to users - in this case, network administrators and operators.  With automated solutions concerns that users want to feel “in control” and able to understand what is going on, even more so if ultimately those users are held accountable for whether or not the network is running smoothly.  To mitigate those concerns, aspects such as the ability to explain actions that are taken - or about to be taken - by AI systems become important <xref target="Sen24"/>.</t>

<t>Beyond reasons of making users more comfortable, there are potentially also legal or regulatory ramifications to ensure that actions taken are properly understood.  For example, agencies such as the FCC may impose fines on network operators when services such as E911 experience outages.  In investigating causes for such outages, the underlying behaviour of the systems has to be properly understood, and even more so the reasons for actions that fall under the realm of network operations. All these aspects about integration and acceptability of the integration of AI in NM processes is detailed in <xref target="acceptability"></xref>.</t>

</section>
<section anchor="AItechniques"><name>AI techniques and network management</name>

<section anchor="problemMapping"><name>Problem type and mapping</name>

<t>An increasing number of different AI techniques have been proposed and applied successfully to a growing variety of different problems in different domains, including network management <xref target="Mus18"/>, <xref target="Xie18"/>. Some of the most recently proposed AI approaches are clearly advancements of older approaches, which they supersede. Many other AI approaches are not predecessors or successors but simply complementary because they are useful for different problems or optimize different metrics. In fact, different AI approaches are useful for different kinds of problem inputs (e.g., tabular data vs. text vs. images vs. time series) and also for different kinds of desired outputs (e.g., a predicted value, a classification, or an action). Similarly, there may be trade-offs between multiple approaches that take the same kind of inputs and desired outputs (e.g., in terms of desired objective, computation complexity, constraints).</t>

<t>Overall, it is a key challenge of using AI technique for network management to properly understand and map which kind of problems with which inputs, outputs, and objectives are best solved with which kind of AI (or non-AI) approaches. Given the wealth of existing and newly released AI approaches, this is far from a trivial task.</t>

<section anchor="sub-challenge-suitable-approach-for-given-input"><name>Sub-challenge: Suitable Approach for Given Input</name>

<t>Different problems in network management come with widely different problem parameters. For example, security-related problems may have large amounts of textual or encrypted data as input, whereas forecasting problems have historical time series data as input. They also vary in the amount of available data.</t>

<t>Both the type and amount of data influences the selection of an appropriate AI technique. On one hand, in scenarios with small dimensional data, classical machine learning techniques (e.g., SVM, tree-based approaches, etc.) are often sufficient and even superior to NNs <xref target="Gre19"/>. On the other hand, NNs have the advantage of learning complex models from large amounts of data without requiring feature engineering. Here, different neural network architectures are useful for different kinds of problems. The traditional and simplest architecture are (fully connected) Multi-Layer Perceptrons (MLPs), which are useful for structured, tabular data. For images, videos, or other high-dimensional data with correlation between “close” features, convolutional neural networks (CNNs) are useful. Recurrent neural networks (RNNs), especially the Long Short-Term Memory (LSTM) architecture, and attention-based neural networks (transformers) are great for sequential data like time series or text. This evolution leads to the era of LLMs also impacting research in networking <xref target="Hua25"/><xref target="Wu24"/>.</t>

<t>It is worth noting that Graph Neural Networks (GNNs) can incorporate and consider the graph-structured input, which is very useful in network management <xref target="Jie22"/>, e.g., to represent the network topology.</t>

<t>The aforementioned rough guidelines can help identify a suitable AI approach or NN architecture. Still, best results are often achieved with a sophisticated combination of different approaches. For example, multiple elements can be combined into one architecture <xref target="Ham23"/>, e.g., with both CNNs and LSTMs, and multiple separate AI approaches can be used as an ensemble to combine their strengths <xref target="Das23"/>. Here, simplifying the mapping from problem type and input to suitable AI approaches and architectures is clearly an open challenge. Future work should address this challenge by providing both clearer guidelines and striving for more general AI approaches that can easily be applied to a large variety of different problem inputs.</t>

</section>
<section anchor="sub-challenge-suitable-approach-for-desired-output"><name>Sub-challenge: Suitable Approach for Desired Output</name>

<t>Similar to the challenge of identifying suitable AI approaches for a given problem input, the desired output for a given problem also affects which AI approach should be chosen. Here, the format of the desired output (single value, class, action, etc.), the frequency of these outputs and their meaning should be considered.</t>

<t>Again, there are rough guidelines for identifying a group of suitable AI approaches. For example, if a single numerical value is required (e.g., the amount of resources to allocate to a service instance), then a supervised regression approaches should be considered as a first candidate option as it is lightweight for this type of task. In case of classification (e.g., of malware or another security issue <xref target="Abd10"/>) instead of predicting a value is desired, supervised methods can be used if labelled training data is available. There are also cases where a single class of training data is available, as for example in the context of anomaly detection where the model is fitted to normal data. In that case, one-class supervised techniques can be considered as a good candidate. Alternatively, unsupervised machine learning can help to cluster given data into separate groups, which can be useful to analyse networking data, e.g., for better understanding different types of traffic or user segments. Furthermore, the quality of the data <xref target="Liu22b"/> directly impacts on the robustness of a ML model with the risk of biased models due to over-fitting. As highlighted with these few examples, finding a suitable approach to a problem depends on many factors including the type of problem to handle but also other contextual elements such as the availability and the quality of data. To help in building AI-based solutions, pipeline generators have merged with automated capabilities, paving the way to the field of AutoML <xref target="Urb23"/>.</t>

<t>In addition to these classical supervised and unsupervised methods, Reinforcement Learning (RL) approaches allows active, sequential decisions rather than simple predictions or classification. This is often useful in network management, e.g., to actively control service scaling and placement <xref target="Sah23"/>. RL agents autonomously select suitable actions in a given environment and are especially useful for self-learning network management. In addition to model-free RL, model-based planning approaches (e.g., Monte Carlo Tree Search) also allow choosing suitable actions but require full knowledge of the environment dynamics. In contrast, model-free RL is ideal for scenarios with unknown environment dynamics, which is often the case in network management.</t>

<t>Like the previous sub-challenge, these are just rough guidelines that can help to select a suitable group of AI approaches. Identifying the most suitable approach within the group, e.g., the best out of the many existing reinforcement learning approaches, is still challenging. And, as before, different approaches could be combined to enable even more effective network management (e.g., heuristics + RL, LSTMs + RL, etc.). Here, further research can simplify the mapping from desired problem output to choosing or designing a suitable AI approach.</t>

</section>
<section anchor="tailoringAI"><name>Sub-challenge: Tailoring the AI Approach to the Given Problem</name>

<t>After addressing the two aforementioned sub-challenges, one may have selected a useful kind of AI approach for the given input and output of a network management problem. For example, one may select regression and supervised learning to forecast upcoming network traffic or select reinforcement learning to continuously control network and service coordination (scaling, placement, etc.). However, even within each of these fields (regression, reinforcement learning, etc.), there are many possible algorithms and hyper-parameters to consider. Selecting a suitable algorithm and parametrizing it with the right hyper-parameters is crucial to tailor the AI approach to the given network management problem.</t>

<t>For example, there are many different regression techniques (classical linear, polynomial regression, lasso/ridge regression, support vector regression, regression trees, neural networks, etc.), each with different benefits and drawbacks and each with its own set of hyper-parameters. Choosing a suitable technique depends on the amount and structure of the input data as well as on the desired output. It also depends on the available amount of compute resources and compute time until a prediction is required. If resources and time are not a limiting factor, many hyper-parameters can be tuned automatically.</t>

<t>This sub-challenge holds for all fields of AI: supervised learning (regression and classification), self-supervised learning, unsupervised learning, and reinforcement learning, each are broad and rapidly growing fields. Selecting suitable algorithms and hyper-parameters to tailor AI approaches to the network management problem is both an opportunity and a challenge. Here, future work should further explore these trade-offs and provide clearer guidelines on how to navigate these trade-offs for different network management tasks. As already mentioned, the AutoML field of research provides solutions to better customize ML algorithms and pipeline. However, such kind of optimization should be optimized according to domain-specific metrics rather than pure-AI metrics only. For instance, the integration of network-specific knowledge can be done through human feedback <xref target="Arz21"/>.</t>

</section>
</section>
<section anchor="performance-of-produced-models"><name>Performance of produced models</name>

<t>From a general point of view, any AI technique will produce results with a certain level of quality. This leads to two inherent questions: (1) what is the definition of the performance in a context of a NM application? (2) How to measure it? (3) How to ensure the quality of produced results by AI is aligned with NM objectives? (4) How to maintain or improve the quality of produced results?</t>

<t>Many metrics have been already defined to evaluate the performance of an AI-based technique according to its NM-level objectives. For example, QoS metrics (throughput, latency) can serve to measure the performance of a routing algorithm along with the computational complexity (memory consumption, size of routing tables). The question is to model and measure these two antagonist types of metrics. Number of true/false positives/negatives are the most basic metrics for network attack detection functions. Although the first two questions are thus already answered even if improvement can be done, question (3) refers to the integration of metrics into AI algorithms. Its objective is to obtain the best results which need to be quantified with these metrics. Depending on the type of algorithm, these metrics are either evaluated in an online manner with a feedback loop (for example with reinforcement learning) or in batch to optimize a model based on a particular context (for example described by a dataset for machine learning).</t>

<t>The problem is two-fold. First, the performance can be measured through multiple metrics of different types (numerical or ordinal for example) and some can be constrained by fixed boundaries (like a maximum latency), making their joint use challenging when creating an AI model to resolve a NM problem. Second, the scale of the metrics differs from each other in terms of importance or impact and can eventually varies on their domains. It can be hard to precisely assess what a good or bad value is (as it might depend on multiple other ones) and it is even more difficult to integrate this in an AI technique, especially for learning algorithms to adjust their models based on performance. Indeed, many learning algorithms run through multiple iterations and rely on internal metrics, Mean Absolute Error (MAE) or Mean Squared Error (MSE) for neural network, gini index or entropy for decision trees, distance to an hyperplane for SVMs, etc) which are not strongly correlated to the final operational metrics of the NM application. AI-internal metrics such as the loss do not match well the metrics related to the final NM objectives, thus the significance and impact of the AI errors cannot be easily translated into the NM domain.</t>

<t>For instance, a decision tree algorithm for classification purposes aims at being able to create branches with a maximum of data from the same classes and so avoid mixing classes. It is done thanks to a criterion like the entropy index but this kind of index does not assume any difference between mixing class A and B or A and C. Assuming now that from an operational point of view, if A and B are mixed in the predictions is not critical, the algorithm should have preferred to mix and A and B rather than A and C even if in the first case it will produce more errors. Therefore, the internal functioning of the AI algorithms should be refined, here by defining a particular criterion to replace the entropy as a quality measure when separating two branches. It assumes that the final NM objectives are integrated at this stage.</t>

<t>Another concrete example is traffic predictors which aim at forecasting traffic demands. They only produce an output that is not necessarily simple to be interpreted and used by, e.g., capacity allocation strategies/policies. A traditional traffic prediction that tries to minimize /(perfectly symmetric) MAE/MSE treats positive and negative errors in identical ways, hence is agnostic of the diverse meaning (and costs) of under- and over-provisioning. And, such a prediction does not provide any information on, e.g., how to dimension resources/capacity to accommodate the future demand avoiding all under-provisioning (which entails service disruption) while minimizing overprovisioning (i.e., wasting resources). In other words, it forces the operator to guess the overprovisioning by taking (non-informed) safety margins. A more sensible approach here is instead forecasting directly the needed capacity, rather than the traffic <xref target="Beg19"/>.</t>

<t>While the one above is just an example, the high-level challenge is devising forecasting models that minimize the correct objective/loss function for the specific NM task at hand (instead of generic MAE/MSE). In this way, the prediction phase becomes an integral part of the NM, and not just a (limited and hard-to-use) input to it. In ML terms, this maps to solving the loss-metric mismatch in the context of anticipatory NM <xref target="Hua19"/>.</t>

<t>Another issue for statistical learning (from examples/observations) is mainly about extracting an estimator from a finite set of input-output samples drawn from an unknown probability distribution that should be descriptive enough for unseen/new input data. In this context online monitoring and error control of the quality/properties of these point estimators (bias, variance, mean squared error, etc.) is critical for dynamic/uncertain network environments. Similar reasoning/challenge applies for interval estimates, i.e., confidence intervals (frequentist) and credible intervals (Bayesian).</t>

<t>Finally, question (4) refers to the ability of an AI solution to remain efficient and to eventually improve over time. This requires dynamic methods capable to adapt to a changing environment. As already highlighted, the models can be dynamically adjusted based on the errors they produced. In the context of ML, the models can be also updated based on new data, either through a complete re-learning phase, fine-tuning or transfer-learning. This assumes to collect and ingest continuously new data. However, as highlighted in <xref target="Sha21b"/>, this type of ML, qualified as online or incremental, raises several challenges when applied to traffic analysis. For example, there is a set of related challenges related to select or discard some data over a time horizon and to label data real-time. Other challenges are more generic to this ML research area such as class imbalance or concept drift.</t>

</section>
<section anchor="lightweight-ai"><name>Lightweight AI</name>

<t>Network management and operations often need to be performed under strict time constraints, i.e. at line rate, in particular in the context of autonomic or self-driven networks. Locating NM functions as close as possible where forwarding is achieved is thus an interesting option to avoid additional delays when these operations are performed remotely, for example in a centralized controller. Besides, forwarding devices may offer available resources to supplement or replace edge resources. In case of AI coupled with network management, AI tasks can be offloaded in network devices, or more generally embedded within the network. Obviously, time-critical tasks are the best candidates to be offloaded within the network. Costly learning tasks should be processed in high-end servers but created models can be deployed, configured, modified and tuned in switches.</t>

<t>Recent advances in network programmability ease the programming of specific tasks at data-plane level. P4 <xref target="Bos14"/> is widely used today for many tasks including firewalling <xref target="Dat18"/> or bandwidth management <xref target="Che19"/>. P4 is prone to be agnostic to a specific hardware. Iy is based on the RMT (Reconfigurable Match Table) architectural model <xref target="Bos13"/> that is generally accepted to be generic enough to represent limited but essential switch architecture components and functionalities. The RMT model allows reconfiguring match-action tables where actions can be usual ones (rewrite some headers, forward, drop...). Actions are thus applied on the packets when they are forwarded. Actions can also be more complex programs with some safeguards: no loop, resistivity, etc. The impact on the program development is huge. For example, real number operations are not available by default while they are widely used in many AI algorithms.</t>

<t>In a nutshell, the first challenge to overcome of embedding AI in a network is the capacity of the hardware to support AI operations (architectural limitation). Considering software equipment such as a virtual switch simplifies the problem but does not totally resolve it as, even in that case, strong line-rate requirement limits the type of programs to be executed. For example, BPF (Berkeley Packet Filter) <xref target="Mcc93"/> programs provide a higher control on packet processing in OVS <xref target="Cha18"/> but still have some limitations, as the execution time of these programs are bounded by nature to ensure their termination, an essential requirement assuming the run-to-completion model which permits high throughput.</t>

<t>The second challenge (resource limitation) of network-embedded AI in the network is to allocate enough resources for AI tasks with a limited impact on other tasks of network devices such as forwarding, monitoring, filtering… Approximation and/or optimization of AI tasks are potential directions to help in this area. For instance, many network monitoring proposals rely on sketches and with a well-tuned implementations for data-plane <xref target="Liu16"/><xref target="Yan18"/>. However, no general optimized AI-programmable abstraction exists to fit all cases and proposals are mostly use-case centric. There have been many propositions to develop specific P4 programs for many NM tasks, including involving ML. For each, this requires a specific adaptation <xref target="Hau23"/> with a few attempts to propose generic programs to be reusable or composed as a kind of libraries such as <xref target="Zha24"/> leveraging quantization, <xref target="Jos21"/> relying on pre-computed lookup tables of real-value functions or <xref target="Swa23"/> proposing function templates for common operations. Besides, distributed processing is a common technique to distribute the load of a single task between multiple entities. AI task decomposition between network elements, edge servers or controllers has been also proposed <xref target="Gup18"/>.</t>

</section>
<section anchor="DistributedAI"><name>Distributed AI</name>

<t>Distributed AI assumes different related tasks and components to be distributed across computational and possibly heterogeneous resources. For example, with advances in transfer and Federated Learning (FL), models can be learned, partially shared and combined or data can be also shared to either improve a local or global model. By nature, a network and a networked system is distributed and is thus well adapted to any distributed application. This is exacerbated with the deployment of fog infrastructure mixing network and computational resources. Hence, network management can directly benefit to the distributed network structure to solve its own particular problems, but any other type of AI-based distributed applications also assumes communication technologies to enable interactions between the different entities. This leads to the two sub-challenges described hereafter.</t>

<section anchor="netManFordistributedAI"><name>Network management for efficient distributed AI</name>

<t>Distributed AI relies on exchanging information between different entities and comes with various requirements in terms of volume, frequency, security, etc. This can be mapped to network requirements such as latency, bandwidth or confidentiality. Therefore, the network needs to provide adequate resources to support the proper execution of the AI distributed application. While this is true for any distributed application, the nature of the problem that is intended to be solved by an AI application and how this would be solved can be considered <xref target="Lin21"/>. For example, in the context of optimizing FL <xref target="Che22"/>, local models can be shared to create a global model. In case of failure of network links or in case of too high latency, some local models might not be appropriately integrated into the global model with a possible impact on AI performance. Depending on the nature of the latter, it might be better to guarantee high performance communications with a few numbers of nodes or to ensure connectivity between all of them even with lower network performance. Coupling is thus necessary between the network management plane and the distributed AI applications which leads to a set of questions to be addressed about interfaces, data and information models or protocols. While the network can be adapted or eventually adapt itself to the AI distributed applications, AI applications could also adapt themselves to the underlying network conditions <xref target="Raj24"/>. It paves the way to research on methods to support AI-aware NM or network-aware AI applications or a mix of both.</t>

</section>
<section anchor="distributed-ai-for-network-management"><name>Distributed AI for network management</name>

<t>For network management applications relying on distributed AI, challenges from <xref target="netManFordistributedAI"></xref> are still valid. Furthermore, network management problems also consider network-specific elements like traffic to be analysed or configuration to be set on distributed network equipment. Co-locating AI processing and these elements (fully or partially) may help to increase performance. For example, pre-calculation on traffic data can be offloaded on network routers before being further processed in high-end servers in a data-center. Besides, as data is forwarded through multiple routers, decomposition of AI processes along the forward path is possible <xref target="Jos22"/>. In general, distributed AI-based network management decisions could be made at different nodes in the network based on locally available information <xref target="Sch21"/>. Hence, deployment of AI-based solutions for network management can also consider various network attributes like network topology, routing policies or network device capability. In that case, management of computational and network resources is even more coupled than in <xref target="netManFordistributedAI"></xref> since the network is both part of the AI pipeline resources and the managed object through AI.</t>

<t>A primary application for distributed AI is for management problems that have a local scope.  One example concerns problems that can be addressed at the edge, involving tasks and control loops that monitor and apply local optimizations to the edge in isolation from activities conducted by other instances across the network.   However, distributed AI can involve techniques in which multiple entities collaborate to solve a global problem. Such solutions lend themselves to problems in which centralized solutions are faced with certain foundational challenges such as security, privacy, and trust:   The need to maintain complete state in a centralized solution may not be practical in some cases due to concerns such as privacy and trust among multiple subdomains which may not want to share all of their data even if they would be willing to collaborate on a problem). Other foundational challenges concern issue related to timeliness, in which distributed solutions may have inherent advantages over centralized solutions as they avoid issues related to delays caused by the need to communicate updates globally and across long distances.</t>

</section>
</section>
<section anchor="ai-for-planning-of-actions"><name>AI for planning of actions</name>

<t>Many tasks in network management revolve around the planning of actions with the purpose of optimizing a network and facilitating the delivery of communication services.  For example, communication paths need to be planned and set up in ways that minimize wasted network resources (to optimize cost) while facilitating high network utilization (avoiding bottlenecks and the formation of congestion hotspots) and ensuring resiliency (by making sure that backup paths are not congruent with primary paths).  Other examples were mentioned in <xref target="pbNM"></xref>.</t>

<t>The promise of central control is that decisions can be optimized when made with complete knowledge of relevant context, as opposed to distributed control that needs to rely on local decisions being made with incomplete knowledge while incurring higher overhead to replicate relevant state across multiple systems.  However, as the scale of networks and interconnected systems continues to grow, so does the size of the planning task.  Many problems are NP-hard.  As a result, solutions typically need to rely on heuristics and algorithms that often result in suboptimal outcomes and that are challenging to deploy in a scalable manner <xref target="Ahm21"/>.</t>

<t>The emergence of Intent-Based Networking (IBN) emphasizes the need for automated planning even further.  IBN should allow users (network operators, not end users of communication services) to articulate desired outcomes without the need to specify how to achieve those outcomes. An Intent-Based System is responsible for translating the intent into courses of action that achieve the desired outcomes and that continue to maintain the outcomes over time <xref target="RFC9315"/>. How the necessary courses of action are derived and what planning needs to take place is left open but where the real challenge lies.  Solutions that rely on clever algorithms devised by human developers face the same challenges as any other network management tasks.</t>

<t>These properties (problems with a clearly defined need, whose solution is faced with exploding search spaces and that today rely on algorithms and heuristics that in many cases result only suboptimal outcomes and significant limitations in scale) make automated planning of actions an ideal candidate for the application of AI-based solutions <xref target="Abd24"/>.</t>

<t>A much-publicized leap in AI has been the development of AlphaGo <xref target="Sil16"/>.  Instead of using AI to merely solve classification problems, AlphaGo has been successful in automatically deriving winning strategy for board games, specifically the game of Go which features a prohibitively large search space that was long thought to put the ability to play Go at a world class level beyond the reach of problems that AI could solve.   Among the remarkable aspects of Alpha Go is that it is able to identify winning strategies completely on its own, without needing those strategies to be taught or learned by observations assuming the system is aware of rules.</t>

<t>The challenge for AI in network management is hence, where is the equivalent of an Alpha Go that can be applied to network management (and networking) problems?  Specifically, better solutions are needed for solutions that automatically derive plans and courses of actions for network optimization and similar NP-hard problems, such as provided today with only limited effectiveness by controllers and management applications.</t>

<t>Although AI-based solutions for the automated planning of actions, including the automated identification of courses of action, have to this point not been explored as much as classification <xref target="Sal20"/>. problems, the quest for autonomous networks in the last decade and the advent of 5G and B5G have led to a quick increase in proposed solutions, as for example within the context of Zero Touch Management <xref target="Cor22"/>.</t>

<t>Also, the evaluation of AI algorithms to derive courses of actions is complex. Contrary to game playing, solutions need to be applied in the real world, where actions have real effects and consequences. Different orientations can be envisioned. First, incremental application of AI decisions with small steps can allow us to carefully observe and detect unexpected effects. This can be complemented with roll-back techniques. Second, verification techniques can be leveraged to verify decisions made by AI are maintained within safety bounds <xref target="Xin24"/>. Third, sandbox environments can be used but they should be representative enough of the real world. After progress in simulation and emulation, recent research advances lead to the definition of digital twins which implies a tight coupling between a real system and its digital twin to ensure a parallel but synchronized execution <xref target="Wu21"/>. Alternatively, transfer learning techniques in another promising area to be able to capitalize on ML models applicable on a real word system, for instance to learn an intrusion detector which can be instantiated in multiple environment <xref target="Sha24"/><xref target="Ans22"/>. Generally, it is also an open problem to make the use of AI more acceptable as highlighted in the dedicated section.</t>

</section>
</section>
<section anchor="netData"><name>Network data as input for ML algorithms</name>

<t>Many applications of AI take data as input. The quality of the outputs of ML-based techniques are highly dependent on the quality and quantity of data used for learning but also during the inference. For example, as modern network infrastructures move towards higher speed and scale, they aim to support increasingly more demanding services with strict performance guarantees. These often require resource reconfigurations at run time, in response to emerging network events, so that they can ensure reliable delivery at the expected performance level. Timely observation and detection of events is also of paramount importance for security purposes and can allow faster execution of remedy actions thus leading to reduced service downtime.</t>

<t>Thus, the challenge of data management is multifaceted as detailed in next subsections.</t>

<section anchor="data-for-ai-based-nm-solutions"><name>Data for AI-based NM solutions</name>

<t>Assuming a network management application, the first problem to address is to define the data to be collected which will be appropriate to obtain accurate results. This data selection can require defining problem-specific data or features (feature engineering). Furthermore, machine learning algorithms only work as desired when data to be analysed respects given properties. Many methods rely on vector-based distances which so supposes that the data encoded into the vector respects the underlying distance semantic. Taking the first n bytes of a packet as vectors and computing distances accordingly is possible but does not embed the semantic of the information carried out in the headers. A solution to circumvent the problem of network traffic representation is to transform traffic data into a specific format that can be easily handled by NN architectures, for instance by creating images analysed by convolutional neural networks <xref target="Sha21"/>. Data can also be easily represented as graphs because topologies or communication graphs would require less adaptation to be given as inputs to GNNs <xref target="Jie22"/>. As an example, graph-based representations are considered as practically efficient due to their intrinsic structural similarities with network data as illustrated in <xref target="Bar23"/> for attack detection.</t>

<t>Since data to handle can also be in a schema-free or eventually text-based format, one example could be the automated annotation of management intents provided in an unstructured textual format (policies descriptions, specifications,) to extract from them management entities and operations. For that purpose, suitable annotation models need to be built using existing NER (Named Entity Recognition) techniques usually applied for NLP. However, this shall be carefully crafted or specialized for network management (intent) language which indirectly bounces back to the challenges of AI techniques for NM specified earlier. Today, with the progress on LLMs, different propositions have emerged as for example in <xref target="Mek24"/><xref target="Fua24"/><xref target="Dze23"/>.<br />
Secondly, similar to the problem of mapping AI algorithms with NM problems in section <xref target="problemMapping"></xref>, data to be collected also depends on the NM problem to be solved. The mapping between the data sources and the problem is not straightforward as all dependencies or correlations are not known in advance and some might be be discovered by the AI algorithms themselves <xref target="For23"/>. In addition, the types of data to collect can vary over time to maintain the performance of an AI-based application or to adapt it to a new context when learned models are updated dynamically. The problems of collecting relevant data and updating models should thus be handled conjointly.</t>

<t>Thirdly, the behaviour of any network is not just derived from the events that can be directly observed, such as network traffic overload, but also from events occurring outside the environment of the network. The information provided by the detectors of such kinds of events, e.g. a natural incident (earthquake, storm), can be used to determine the adaptation of the network to avoid potential problems derived from such events. Those can be provided by big data sources as well as sensors of many kinds. The challenge related to this task is to process large amounts of data and associate it with the effects that those events have on the network. It is hard to determine the static and dynamic relation between the data provided by external sources and the specific implications it may have in networks. For instance, the effect of a “flash crowd” detected in an external source may require adapting the network service configuration to support is related workload. The objective is to complement a control-loop, as shown in <xref target="Mar18"/>, by including the specific AI engines into the decision components as well as the processes that close the loop, so the AI engine can receive feedback from the network in order to improve its own behaviour.</t>

</section>
<section anchor="data-collection"><name>Data collection</name>

<t>Once defined, the second problem to address is the collection of data. Monitoring frameworks have been developed for many years such as IPFIX <xref target="RFC7011"/> and more recently with SDN-based monitoring solutions <xref target="Yu14"/><xref target="Ngu20"/>. However, going towards more AI for actions in network management supposes also to retrieve more than traffic related information. Actually, configuration information such as topologies, routing tables or security policies have been proven to be relevant in specific scenarios. As a result, many different technologies can be used to retrieve meaningful data. To support improved QoE, monitoring of the application layer is helpful but far from being easy with the heterogeneity of end-user applications and the wide use of encrypted channels. Monitoring techniques need to be reinvented through the definition of new techniques to extract knowledge from raw measurement <xref target="Bri19"/> or by involving end-users with crowd-sourcing <xref target="Hir15"/> and distributed monitoring. Also, the data-mesh concept <xref target="Mac22"/> proposes to classify data into three categories: source-aligned, aggregate and consumer-aligned. Source-aligned data are those related to the same operational domain, and it is important to correlate or aggregate them with higher planes: management-, control- and forwarding plane. An issue is the difference, not only in the nature of data, but in their volumes and their variety. Some may change rapidly over time (for example network traffic) while other may be quite stable (device state).</t>

<t>The collecting process requirements depend on the kind of processing. We can distinguish two major classes: batch/offline vs real-time/online processing. In particular, real-time monitoring tools are key in enabling dynamic resource management functions to operate on short reconfiguration cycles. However, maintaining an accurate view of the network state requires a vast amount of information to be collected and processed. While efficient mechanisms that extract raw measurement data at line rate have been recently developed, the processing of collected data is still a costly operation. This involves potentially sampling, evaluating and aggregating a vast amount of state information as a response to a diverse set of monitoring queries, before generating accurate reports. One difficult problem resides also in the availability of data as real-time data from different sources to be aggregated may not arrive at the same time requiring so some buffering techniques. Machine learning methods, e.g. based on regression, can be used to intelligently filter the raw measurements and thus reduce the volume of data to process. For example, in <xref target="Tan20"/> the authors proposed an approach in which the classifiers derived for this purpose (according to measurements on traffic properties) can achieve a threefold improvement in the query processing capability. A residual question is the storage of raw measurements. In fact, predicting the lifetime of data is challenging because their analysis may not be planned and triggered by a particular event (for example, an anomaly or attack). As a result, the provisioning of storage capacity can be hard.</t>

<t>In parallel to the continuously increasing dynamicity of networks and complexity of traffic, there is a trend towards more user traffic processing customization <xref target="RFC8986"/><xref target="Li19"/>. As a result, fine grained information about network element states is expected and new propositions have emerged to collect on-path data or in-band network telemetry information <xref target="Tan20b"/>. These new approaches have been designed by introducing much flexibility and customization and could be helpful to be used in conjunction with AI applications. However, the seamless coupling of telemetry processes with packet forwarding requires careful definition of solutions to limit the overhead and the impact of the throughput while providing the necessary level of details. This shares commonalities with the lightweight AI challenge.</t>

</section>
<section anchor="usable-data"><name>Usable data</name>

<t>Although all agree on the necessity to have more shared datasets, it is quite uncommon in practice. Data contains private or sensitive information and may not be shared because of the criticality of data (which can be used by ill-intentioned adversaries) or due to laws or regulations, even within the same company. To solve this issue, anonymization techniques <xref target="Dij19"/> can be enhanced to optimize the trade-off between valuable data and sensitive information (potential) leakage or reconstruction. 
Whatever the final user of data, regulations and laws impose rules on data management with potentially costly impact if they are not respected voluntarily or not. Defining a new monitoring framework should always consider security and privacy aspects, for example to let any user/customer or access/remove its own data with General Data Protection Regulation (GDPR) in EU. The challenge resides here in the capacity of qualifying what is critical or private information and the capacity for an adversary to reconstruct it from other sources of data. Hence AI/ML based solutions will require more data but also more administrative, legal and ethical procedures. Those can last long and so slow down the deployment of a new solution. In addition, this requires interaction with experts from different domains (e.g. AI engineer and a lawyer) for example to ensure by-design privacy in traffic analysis techniques <xref target="Wan22"/>. The integration of these non-technical constraints should be considered when defining new data to be collected or a new technique to collect data. However, knowing the final use of data is most of the time necessary for ethical and legal assessment which assumes that those considerations should be integrated from the early design of new AI-based solutions.</t>

<t>For supervised or semi-supervised training, having a labelled dataset is a prerequisite. It constitutes a major challenge as well. While probes exist to collect real network data, those data are typically unlabelled. This limits application of ML to unsupervised learning tasks (learning from data). Because manual labelling is a tedious task. one option is to leverage AI to guide humans. This may also support a better generalization of a learned model. Indeed, an underlying challenge is the genericity or coverage of the datasets. Labels encode values of an objective function, the challenge posed by the design of such tools is tremendous since for involving a M:N relationship: 1 data type may be associated to M objective function values and N data types may be associated to 1 objective function. As a result, most datasets used for research encodes a single label for a particular application like attack label for datasets to be used in the context of intrusion detection or application type for network traffic used for classification where the value of a single dataset could be capitalized in several applications. More generally, in the context of intrusion detection, using raw data rather than pre-processed data as it is common in open dataset has been demonstrated to be inefficient <xref target="Dub24"/>.</t>

<t>Again, researchers need empirical (or at least realistic) datasets to validate their solutions. Unfortunately, as highlighted above, having such data from real deployments for various reasons (business secrets, privacy concerns, concerns that vulnerabilities are revealed by accident, raw unlabelled data, etc.) is tough. Even if such a dataset is available it might not be enough to convincingly validate a new algorithm. 
Instead of falling back to artificial testbed experiments or simulation, it would be useful to have the capability to generate datasets with characteristics that are not 100% identical but like the characteristics of one or more real datasets. Such synthetic networks can be used to validate new management algorithms, intrusion detection systems, etc. 
The usage of AI, Generative Adversarial Networks (GANs), in this area <xref target="Hui22"/> is not yet widespread and there are still many concerns that deter researchers, e.g. the fear of leaking sensitive information from the original dataset into the synthetic dataset. Furthermore, a major underlying challenge is to generate data realistic enough. This requires formalizing and integrating network-specific constraints, such as protocol specification, when generating data <xref target="Jia24"/>.</t>

</section>
</section>
<section anchor="acceptability"><name>Acceptability of AI</name>

<t>Networks are critical infrastructures. On one hand, they should be operated without interruption and must be interoperable. Networks, except in a lab, are not isolated which slow down innovation in general. For example, changing Internet routing protocols need to be accepted by multiples entities such as operators of interconnected networks. The same applies for protocols. Even if there have been several versions of major protocols in use like TCP or DNS, there are still some security issues which cannot be patched with 100% guarantee. On the other hand, results provided by AI solutions are uncertain by nature. The same technique applied in different environments can produce different results. AI techniques need some effort (time and human) to be properly configured or to be stabilized. For instance, RL needs several iterations before being able to produce acceptable results. These properties of AI techniques are thus a bit antagonist with the criticality of network infrastructures. With that in mind, acceptability of AI by network operators is clearly an obstacle for its larger adoption.</t>

<section anchor="explainability"><name>Explainability of Network-AI products</name>

<t>A common issue across many ML applications is their lack to provide human-understandable reasoning processes. This means that, after training, the knowledge acquired by ML models is unintelligible to humans. As a result, offering hard guarantees on performance is a very challenging issue. In addition, complex ML models like neural networks -that often have more than hundreds of thousands of parameters- are very hard to debug or troubleshoot in case of failure.</t>

<t>While this is a common issue for all applications of AI, many areas work well with uncertainty and the black-box behaviour of AI-based solutions. For instance, users accept an inherent error in recommender systems or computer vision solutions.</t>

<t>The networking field has already produced a set of well-established network management algorithms and methods, with clear performance guarantees and troubleshooting mechanisms <xref target="Rex06"/><xref target="Kr14"/>. As such, improving debugging, troubleshooting and guarantees on AI-based solutions for networking is a must. AI researchers and practitioners are devoting large research efforts to improve this aspect of ML models, which is commonly known as explainability <xref target="XAI"/>.</t>

<t>This set of techniques provides insights and, in some cases, guarantees on the performance and behaviour of ML-based solutions. Understanding such techniques, researching and applying them to network AI is critical for the success of the field.</t>

<t>There exist several ML-based methods that are human-understandable, although not widely used today. For instance, <xref target="Mar20"/> shows a method for building anticipation models (prediction) that provide explanations while determining some actions for tuning some parameters of the network. There are other challenges that should be addressed, such as providing explanations for other ML methods that are quite extended. For instance, xNN/SVM models can be accompanied by Digital Twins of the network that are reversely explored to explain some output from the ML model (e.g., xNN/SVM). In this context, there already exist several methods <xref target="Zil20"/><xref target="Puj21"/> that produce human-readable interpretations of trained NN models, by analysing their neural activations on different inputs. It is worth noting that Digital Twins are not considered per se an AI approach; they merely serve to provide a digital representation of a network that can serve as its proxy and offer a layer of indirection between management applications and actual network resources. However, it is conceivable that AI-based management applications can be combined and operate in conjunction with Digital Twin technology, for example to use a Digital Twins as an experimentation sandbox or staging ground for AI-driven applications.)</t>

</section>
<section anchor="ai-based-products-and-algorithms-in-production-systems"><name>AI-based products and algorithms in production systems</name>

<t>AI-based network management and optimization algorithms are first trained, then the resulting model is used to produce relevant inferences in operation, either in management or optimization scenarios. A relevant question for the success of AI-based solutions is: where does this training occur?</t>

<t>Traditionally, AI-based models have been trained in the same scenario where they operate<xref target="Val17"/><xref target="Xu18"/>, this is the customer network. However, this presents critical drawbacks. First, training an AI model for management and operation typically requires generating network configurations and scenarios that can break the network. This is because training requires seeing a broad spectrum of scenarios. Thus, training in production networks is very challenging. Second, customer networks may not be equipped with the monitoring infrastructure required to collect the data used in the training process (e.g., performance metrics). Performing learning directly into a production network is possible assuming imperfect models and the need of several step of refinement before it gets stable. For non-critical management task, such assumption can hold, and additional safe-guarding mechanisms should be considered in order to keep outputs of ML algorithms (such as decisions) within acceptable boundaries.</t>

<t>A more sensible approach is to train the AI-based product in a lab, for instance in the vendor’s premises. In the lab, AI models can be trained in a controlled testbed, with any configuration, even ones that break the network. However, the main challenge here arises from the fundamental differences between the lab’s network and the customer networks. For instance, the topology of the lab’s network might be smaller, etc. As a result, there is a need for the learned models to to generalize. In this context, generalization means that models should be able to operate in other scenarios not seen during training, with different topologies, routing configurations, scheduling policies, etc. This well-known problem is due to the dependency between training and testing data when benchmarking models.</t>

<t>In order to address this generalization problem, multiple complementary approaches are possible:<br />
One approach is training on diverse data that represents large parts of the expected problem space. For example, training with various traffic patterns will help improving the generalization of an AI-based traffic analyser. 
Another approach is to leverage AI designs or architectures that facilitate generalization. One example is GNNs <xref target="gnn1"/><xref target="gnn2"/>. They are a type of neural network able to operate and generalize over graphs. Indeed, networks are fundamentally represented as graphs: topology, routing, etc. With GNNs, vendors can train the AI model in a lab with a certain topology and then directly use the resulting model in different customer networks, even with different network topologies. 
Finally, another approach is Transfer Learning <xref target="tl1"/>. With this technique, the knowledge gained in the lab’s training is used to operate in the customer network. Transfer Learning still requires that some data from the customer is used to re-train and fine-tune the model (e.g., accurate performance measurements). This means that, for each customer network, re-training is required. This may be problematic since it requires added cost and access to customer data.</t>

<t>In addition to the challenge of generalizing from training to production environment, there are also challenges in terms of interoperability between different AI approaches and different deployment environments. 
As mentioned above, AI approaches may be deployed in diverse environments, e.g., for training and production, but also for local development, for testing, and for validation or in different part of the production systems. 
These environments may differ in available compute resources, network topology, operating systems, cloud providers, etc. (single node machine, single cluster, many distributed clusters, etc.). Deploying the same AI solutions in these different environments can lead to various challenges in terms of interoperability. Common AI frameworks support scaling across networks of different size. Yet, many frameworks are often combined, e.g., for data collection, processing, predictions, validation, etc. Again, ensuring interoperability between these frameworks can be tedious.</t>

<t>This shares similarities with problems described in <xref target="DistributedAI"></xref> and particularly emphasizes the need for network environments to provide interfaces and descriptions suitable for AI solutions to be properly instantiated and configured.</t>

<t>One approach to address these interoperability challenges is through meta-frameworks that interface with most available AI frameworks. These meta-frameworks provide a higher level of abstraction and often allow seamless deployment across different environments (e.g., on-premises or at different cloud providers) <xref target="Mor18"/>.</t>

</section>
<section anchor="ai-with-humans-in-the-loop"><name>AI with humans in the loop</name>

<t>Depending on the network management task, AI can automate and replace manual human control, or it can complement human experts and keep them in the loop. Keeping humans in the loop will be an important step of building trust in AI approaches and help ensure the desired outcomes. 
There are various ways of keeping humans in the loop in the different fields of AI <xref target="Wu22"/>, which could be useful for different aspects of network management.</t>

<t>In classification tasks (e.g., detecting security breaches, malware or detecting anomalies), trained AI models provide a confidence score in addition to the predicted class. If the confidence is high, the prediction is used directly. If the confidence is too low, a human expert may jump in and make the decision - thereby also providing valuable training data to improve the AI model. Such approaches are already being used in industry, e.g., to automatically label datasets (AWS SageMake). Similar approaches could also be used for other supervised learning tasks, e.g., regression. Still, it is an open challenge to keep humans in the loop in all phases of the learning process.</t>

<t>When using RL, e.g. to control service scaling and placement or route traffic flows, theagents typically interact with the environment (i.e., the simulated or real network) completely autonomously without human feedback. However, there is a growing number of approaches to put human experts back into the loop. One approach is offline reinforcement learning, where the training data does not come from the reinforcement learning agent’s own exploration but from pre-recorded traces of human experts (e.g., placement decisions that were made by humans before). Another approach is to reward the RL agent based on human feedback rather than a pre-defined reward function <xref target="Lee21"/>. Again, while there are first promising approaches, more work is required in this area. 
Overall, it is an open challenge to both leverage the benefits of AI but keep human experts in the loop where it is useful.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security considerations</name>

<t>This document introduces the challenges of coupling AI and NM. Since the aim of this document is not to address a particular NM problem by defining a solution and because many possible ones can be developed further, it is not possible at this stage to define security concerns specific to a solution. However, examples of applications mentioned and cited in the different sections may face their own security concerns. In this section, our objective is to highlight high-level security considerations to be considered when coupling AI and NM. Those concerns serve as the common basis to be refined according when a particular NM application is developed.</t>

<section anchor="ai-based-security-solutions"><name>AI-based security solutions</name>

<t>The first security consideration refers to the use of AI for NM problem related to security of the managed networked systems. There are multiple scenarios where AI can be leveraged: to perform traffic filtering, to detect anomalies or to decide on target moving defence strategies. In these cases, the performance of the AI algorithms impacts on the security performance (e.g. detection or mitigation effectiveness) like any other non-AI system. However, AI methods generally tend to obfuscate how predictions are made and decisions taken. Explainability of AI is thus highly important and is addressed globally in section <xref target="explainability"></xref>.</t>

<t>Assuming a ML trained model, there is always an uncertainty regarding reachable performance on the wild once the solution is deployed as it can suffer from a poor generalization due to different reasons. There are two major problems which are well known in the ML field: overfitting or under-fitting.  In the first case, the learned model is too specific to the training data while in the second case the model does not infer any valuable knowledge from data. To avoid these issues, hyper-parameter fine-tuning is necessary. For example, the number of iterations is an essential hyper-parameter to be adjusted to learn a neural network model. If it is too low, the learning does not converge to a representative model of the training data (underfitting). With a high value, there is a risk that the model is too close to the training data (overfitting). In general, finding the right hyper-parameters is helpful to find a good ML algorithm configuration. There are different techniques ranging from grid-search to Bayesian optimization falling into the AI area of Hyper-Parameter Optimization (HPO) <xref target="Bis23"/>. This consideration goes beyond the sole problem of hyper-parameters settings but as a full analysis pipeline also assumes the ML algorithm to be selected or the data pre-processing to be configured. This reflects challenges from the AI research area covered by AutoML technique. In this document, this is also referred in section <xref target="tailoringAI"></xref> when considered in the context of NM. As highlighted in the aforementioned section, some expertise or area-specific knowledge can help guiding automated configuration processes.</t>

<t>Besides, machine learning assumes to have representative training data. The quality of dataset for learning is a vast problem. Additionally, the representation of data needs to be addressed carefully to be properly analysed by AI models, for example with pre-processing techniques to normalize data, balance classes or encode categorical features depending on the type of algorithms. Actually, section <xref target="netData"></xref> of this document fully addresses the concerns related to data in regard to NM problems.</t>

</section>
<section anchor="security-of-ai"><name>Security of AI</name>

<t>Although ensuring a good performance of AI algorithms is already challenging, assuming an attacker aiming at compromising it emphasizes the problem. Adversarial AI and notably adversarial ML have attracted a lot of attention over the last year. Adversarial AI and ML relates to both attack and defences. While this is out of scope of the document, evaluating threats against an ML system before deploying it is an important aspect. This supposes to assess what types of information the attacker can access (training data, trained model, algorithm configuration...) and the performable malicious actions (inject false training data, test the system, poison a model, etc.) to evaluate the magnitude of the impact of possible attacks.</t>

<t>For illustration purposes, we refer hereafter to some examples. In the case of an intrusion detector, an attacker may try to poison training data by providing adversarial samples to ensure that the detector will miss-classify the future attacks <xref target="Jmi22"/>. In a white-box approach where the model is known from the attacker, the attack can be carefully crafted to avoid being properly labelled. For instance, packet sizes and timings can be easily modified to bypass ML-based traffic classification system <xref target="Nas21"/>. In a black-box model, the attacker ignores the functioning or training data of the ML systems but can try to infer some information. For example, the attacker can try to reconstruct sensitive information which have been used for training. This type of attack qualified as model inversion <xref target="Fre15"/> raises concern regarding privacy.</t>

<t>All these threats are exacerbated in the context of solutions relying on distributed AI involving multiple entities that are not necessarily controlled by the same authority. Once the threats are assessed, solutions need to be developed and deployed which can be either proactive by providing some guarantees regarding the involved entities using authentication or trust mechanisms but also reactive by validating data processing through voting mechanisms or knowledge proofs. Other solutions include defensive techniques to rate limit or filter queries to a particular deployed model. All these examples are for illustration purposes and are not exhaustive.</t>

</section>
<section anchor="relevance-of-ai-based-outputs"><name> Relevance of AI-based outputs</name>

<t>Security breaches can be created by an AI-driven application. Generally, any system that will be used to guide or advice on actions to be perform on network raise the same issue. For example, if an AI algorithm decides to change the filtering tables in a network it may compromise access control policies. Irrelevant results could be also produced. In the area of QoS, an AI system could allocate a bandwidth to a flow higher to the real link capacity. As shown from these two examples, an AI can produce decisions or values which are out of bounds of normal operations. To avoid such issues, safeguards can be added to discard or correct irrelevant outputs. Detecting such type of outputs can be also challenging in complex and distributed systems such as a network. Formal verification methods or testing techniques are helpful in that context.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>

&RFC7011;
&RFC8986;
&RFC9315;


    </references>

    <references title='Informative References'>

<reference anchor="Mac22" >
  <front>
    <title>Data Mesh: Concepts and Principles of a Paradigm Shift in Data Architectures</title>
    <author initials="I. A." surname="Machado" fullname="Inês Araújo Machado">
      <organization></organization>
    </author>
    <author initials="C." surname="Costa" fullname="Carlos Costa">
      <organization></organization>
    </author>
    <author initials="M. Y." surname="Santos" fullname="Maribel Yasmina Santos">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>Procedia Computer Science, Volume 196</annotation></reference>
<reference anchor="Wu22" >
  <front>
    <title>A survey of human-in-the-loop for machine learning</title>
    <author initials="X." surname="Wu" fullname="Xingjiao Wu">
      <organization></organization>
    </author>
    <author initials="L." surname="Xiao" fullname="Luwei Xiao">
      <organization></organization>
    </author>
    <author initials="Y." surname="Sun" fullname="Yixuan Sun">
      <organization></organization>
    </author>
    <author initials="J." surname="Zhang" fullname="Junhang Zhang">
      <organization></organization>
    </author>
    <author initials="T." surname="Ma" fullname="Tianlong Ma">
      <organization></organization>
    </author>
    <author initials="L." surname="He" fullname="Liang He">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>Elsevier Future Generation Computer Systems</annotation></reference>
<reference anchor="Dub24" >
  <front>
    <title>Faulty use of the CIC-IDS 2017 dataset in information security research</title>
    <author initials="R." surname="Dube" fullname="R. Dube">
      <organization></organization>
    </author>
    <date year="2024"/>
  </front>
<annotation>Journal of Computer Virology and Hacking Techniques</annotation></reference>
<reference anchor="Jia24" >
  <front>
    <title>NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic Generation</title>
    <author initials="X." surname="Jiang" fullname="Xi Jiang">
      <organization></organization>
    </author>
    <author initials="S." surname="Liu" fullname="Shinan Liu">
      <organization></organization>
    </author>
    <author initials="A." surname="Gember-Jacobson" fullname="Aaron Gember-Jacobson">
      <organization></organization>
    </author>
    <author initials="A. N." surname="Bhagoji" fullname="Arjun Nitin Bhagoji">
      <organization></organization>
    </author>
    <author initials="P." surname="Schmitt" fullname="Paul Schmitt">
      <organization></organization>
    </author>
    <author initials="F." surname="Bronzino" fullname="Francesco Bronzino">
      <organization></organization>
    </author>
    <author initials="N." surname="Feamster." fullname="Nick Feamster.">
      <organization></organization>
    </author>
    <date year="2024"/>
  </front>
<annotation>ACM on Measurement and Analysis of Computing Systems</annotation></reference>
<reference anchor="Wan22" >
  <front>
    <title>Multiple Strategies Differential Privacy on Sparse Tensor Factorization for Network Traffic Analysis in 5G</title>
    <author initials="J." surname="Wang" fullname="J. Wang">
      <organization></organization>
    </author>
    <author initials="H." surname="Han" fullname="H. Han">
      <organization></organization>
    </author>
    <author initials="H." surname="Li" fullname="H. Li">
      <organization></organization>
    </author>
    <author initials="S." surname="He" fullname="S. He">
      <organization></organization>
    </author>
    <author initials="P. K." surname="Sharma" fullname="P. Kumar Sharma">
      <organization></organization>
    </author>
    <author initials="L." surname="Chen" fullname="L. Chen">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>IEEE Transactions on Industrial Informatics, 18(3)</annotation></reference>
<reference anchor="For23" >
  <front>
    <title>ADT: AI-Driven network Telemetry processing on routers</title>
    <author initials="P." surname="Foroughi" fullname="Parisa Foroughi">
      <organization></organization>
    </author>
    <author initials="F." surname="Brockners" fullname="Frank Brockners">
      <organization></organization>
    </author>
    <author initials="J.-L." surname="Rougier" fullname="Jean-Louis Rougier">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
<annotation>Elsevier Computer Networks (220)</annotation></reference>
<reference anchor="Bar23" >
  <front>
    <title>FTG-Net: Hierarchical Flow-to-Traffic Graph Neural Network for DDoS Attack Detection</title>
    <author initials="L." surname="Barsellotti" fullname="L. Barsellotti">
      <organization></organization>
    </author>
    <author initials="L. D." surname="Marinis" fullname="L. De Marinis">
      <organization></organization>
    </author>
    <author initials="F." surname="Cugini" fullname="F. Cugini">
      <organization></organization>
    </author>
    <author initials="F." surname="Paolucci" fullname="F. Paolucci">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
<annotation>IEEE International Conference on High Performance Switching and Routing (HPSR)</annotation></reference>
<reference anchor="Dze23" >
  <front>
    <title>LLM-Based Policy Generation for Intent-Based Management of Applications</title>
    <author initials="K." surname="Dzeparoska" fullname="K. Dzeparoska">
      <organization></organization>
    </author>
    <author initials="J." surname="Lin" fullname="J. Lin">
      <organization></organization>
    </author>
    <author initials="A." surname="Tizghadam" fullname="A. Tizghadam">
      <organization></organization>
    </author>
    <author initials="A." surname="Leon-Garcia," fullname="A. Leon-Garcia,">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
<annotation>International Conference on Network and Service Management (CNSM)</annotation></reference>
<reference anchor="Fua24" >
  <front>
    <title>An Intent-based Networks Framework based on Large Language Models</title>
    <author initials="A." surname="Fuad" fullname="A. Fuad">
      <organization></organization>
    </author>
    <author initials="A. H." surname="Ahmed" fullname="A. H. Ahmed">
      <organization></organization>
    </author>
    <author initials="M. A." surname="Riegler" fullname="M. A. Riegler">
      <organization></organization>
    </author>
    <author initials="T." surname="Čičić" fullname="T. Čičić">
      <organization></organization>
    </author>
    <date year="2024"/>
  </front>
<annotation>IEEE International Conference on Network Softwarization (NetSoft)</annotation></reference>
<reference anchor="Mek24" >
  <front>
    <title>Intent-Based Management of Next-Generation Networks: an LLM-Centric Approach</title>
    <author initials="A." surname="Mekrache" fullname="A. Mekrache">
      <organization></organization>
    </author>
    <author initials="A." surname="Ksentini" fullname="A. Ksentini">
      <organization></organization>
    </author>
    <author initials="C." surname="Verikoukis" fullname="C. Verikoukis">
      <organization></organization>
    </author>
    <date year="2024"/>
  </front>
<annotation>IEEE Network, 38(5)</annotation></reference>
<reference anchor="Ans22" >
  <front>
    <title>Auto-tuning of Hyper-parameters for Detecting Network Intrusions via Meta-learning</title>
    <author initials="O." surname="Anser" fullname="Omar Anser">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="I." surname="Chrisment" fullname="Isabelle Chrisment">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>IEEE/IFIP Network Operations and Management Symposium (NOMS) - AnNet workshop</annotation></reference>
<reference anchor="Sha24" >
  <front>
    <title>DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm</title>
    <author initials="S." surname="Latif" fullname="Shahid Latif">
      <organization></organization>
    </author>
    <author initials="W." surname="Boulila" fullname="Wadii Boulila">
      <organization></organization>
    </author>
    <author initials="A." surname="Koubaa" fullname="Anis Koubaa">
      <organization></organization>
    </author>
    <author initials="Z." surname="Zou" fullname="Zhuo Zou">
      <organization></organization>
    </author>
    <author initials="J." surname="Ahmad" fullname="Jawad Ahmad">
      <organization></organization>
    </author>
    <date year="2024"/>
  </front>
<annotation>Elsevier Journal of Network and Computer Applications</annotation></reference>
<reference anchor="Wu21" >
  <front>
    <title>Digital Twin Networks: A Survey</title>
    <author initials="Y." surname="Wu" fullname="Y. Wu">
      <organization></organization>
    </author>
    <author initials="K." surname="Zhang" fullname="K. Zhang">
      <organization></organization>
    </author>
    <author initials="Y." surname="Zhang" fullname="Y. Zhang">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>IEEE Internet of Things Journal, 8(18)</annotation></reference>
<reference anchor="Xin24" >
  <front>
    <title>Occam: A Programming System for Reliable Network Management</title>
    <author initials="J." surname="Xing" fullname="Jiarong Xing">
      <organization></organization>
    </author>
    <author initials="K.-F." surname="Hsu" fullname="Kuo-Feng Hsu">
      <organization></organization>
    </author>
    <author initials="Y." surname="Xia" fullname="Yiting Xia">
      <organization></organization>
    </author>
    <author initials="Y." surname="Cai" fullname="Yan Cai">
      <organization></organization>
    </author>
    <author initials="Y." surname="Li" fullname="Yanping Li">
      <organization></organization>
    </author>
    <author initials="Y." surname="Zhang" fullname="Ying Zhang">
      <organization></organization>
    </author>
    <author initials="A." surname="Chen" fullname="Ang Chen">
      <organization></organization>
    </author>
    <date year="2024"/>
  </front>
<annotation>ACM European Conference on Computer Systems (Eurosys)</annotation></reference>
<reference anchor="Cor22" >
  <front>
    <title>Zero Touch Management: A Survey of Network Automation Solutions for 5G and 6G Networks</title>
    <author initials="E." surname="Coronado" fullname="Estefanía Coronado">
      <organization></organization>
    </author>
    <author initials="R." surname="Behravesh" fullname="Rasoul Behravesh">
      <organization></organization>
    </author>
    <author initials="T." surname="Subramanya" fullname="Tejas Subramanya">
      <organization></organization>
    </author>
    <author initials="A." surname="Fernàndez-Fernàndez" fullname="Adriana Fernàndez-Fernàndez">
      <organization></organization>
    </author>
    <author initials="M. S." surname="Siddiqui" fullname="Muhammad Shuaib Siddiqui">
      <organization></organization>
    </author>
    <author initials="X." surname="Costa-Pérez" fullname="Xavier Costa-Pérez">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>IEEE Communications Surveys &amp; Tutorials, 24(4)</annotation></reference>
<reference anchor="Sal20" >
  <front>
    <title>A review on machine learning–based approaches for Internet traffic classification</title>
    <author initials="O." surname="Salman" fullname="Ola Salman">
      <organization></organization>
    </author>
    <author initials="I. H." surname="Elhajj" fullname="Imad H. Elhajj">
      <organization></organization>
    </author>
    <author initials="A." surname="Kayssi" fullname="Ayman Kayssi">
      <organization></organization>
    </author>
    <author initials="A." surname="Chehab" fullname="Ali Chehab">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Springer Annals of Telecommunication</annotation></reference>
<reference anchor="Abd24" >
  <front>
    <title>A dynamic AI-based algorithm selection for Virtual Network Embedding</title>
    <author initials="A." surname="Bouroudi" fullname="Abdelmounaim Bouroudi">
      <organization></organization>
    </author>
    <author initials="A." surname="Outtagarts" fullname="Abdelkader Outtagarts">
      <organization></organization>
    </author>
    <author initials="Y." surname="Hadjadj-Aoul" fullname="Yassine Hadjadj-Aoul">
      <organization></organization>
    </author>
    <date year="2024"/>
  </front>
<annotation>Springer Annals of Telecommunication</annotation></reference>
<reference anchor="Ahm21" >
  <front>
    <title>Scalability, Consistency, Reliability and Security in SDN Controllers: A Survey of Diverse SDN Controllers</title>
    <author initials="S." surname="Ahmad" fullname="S. Ahmad">
      <organization></organization>
    </author>
    <author initials="A. H." surname="Mir" fullname="A. H. Mir">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>Springer Journal of Network and Systems Management, 29(2)</annotation></reference>
<reference anchor="Che22" >
  <front>
    <title>Federated Learning Over Wireless IoT Networks With Optimized Communication and Resources</title>
    <author initials="H." surname="Chen" fullname="H. Chen">
      <organization></organization>
    </author>
    <author initials="S." surname="Huang" fullname="S. Huang">
      <organization></organization>
    </author>
    <author initials="D." surname="Zhang" fullname="D. Zhang">
      <organization></organization>
    </author>
    <author initials="M." surname="Xiao" fullname="M. Xiao">
      <organization></organization>
    </author>
    <author initials="M." surname="Skoglund" fullname="M. Skoglund">
      <organization></organization>
    </author>
    <author initials="H. V." surname="Poor" fullname="H. V. Poor">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>IEEE Internet of Things Journal, 9(17)</annotation></reference>
<reference anchor="Lin21" >
  <front>
    <title>Optimizing AI Service Placement and Resource Allocation in Mobile Edge Intelligence Systems</title>
    <author initials="Z." surname="Lin" fullname="Z. Lin">
      <organization></organization>
    </author>
    <author initials="S." surname="Bi" fullname="S. Bi">
      <organization></organization>
    </author>
    <author initials="Y. -J. A." surname="Zhang" fullname="Y. -J. A. Zhang">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>IEEE Transactions on Wireless Communications, 20(11)</annotation></reference>
<reference anchor="Raj24" >
  <front>
    <title>CASSINI: Network-Aware Job Scheduling in Machine Learning Clusters</title>
    <author initials="S." surname="Rajasekaran" fullname="Sudarsanan Rajasekaran">
      <organization></organization>
    </author>
    <author initials="M." surname="Ghobadi" fullname="Manya Ghobadi">
      <organization></organization>
    </author>
    <author initials="A." surname="Akella" fullname="Aditya Akella">
      <organization></organization>
    </author>
    <date year="2024"/>
  </front>
<annotation>USENIX Symposium on Networked Systems Design and Implementation (NSDI)</annotation></reference>
<reference anchor="Swa23" >
  <front>
    <title>Homunculus: Auto-Generating Efficient Data-Plane ML Pipelines for Datacenter Networks</title>
    <author initials="T." surname="Swamy" fullname="T. Swamy">
      <organization></organization>
    </author>
    <author initials="A." surname="Zulfiqar" fullname="A. Zulfiqar">
      <organization></organization>
    </author>
    <author initials="L." surname="Nardi" fullname="L. Nardi">
      <organization></organization>
    </author>
    <author initials="M." surname="Shahbaz" fullname="M. Shahbaz">
      <organization></organization>
    </author>
    <author initials="K." surname="Olukotun" fullname="K. Olukotun">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
<annotation>ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)</annotation></reference>
<reference anchor="Jos21" >
  <front>
    <title>InREC: In-network REal Number Computation</title>
    <author initials="M." surname="Jose" fullname="Matthews Jose">
      <organization></organization>
    </author>
    <author initials="K." surname="Lazri" fullname="Kahina Lazri">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="O." surname="Festor" fullname="Olivier Festor">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>IFIP/IEEE International Symposium on Integrated Network Management (IM)</annotation></reference>
<reference anchor="Zha24" >
  <front>
    <title>A Machine Learning-Based Toolbox for P4 Programmable Data-Planes</title>
    <author initials="K." surname="Zhang" fullname="K. Zhang">
      <organization></organization>
    </author>
    <author initials="N." surname="Samaan" fullname="N. Samaan">
      <organization></organization>
    </author>
    <author initials="A." surname="Karmouch" fullname="A. Karmouch">
      <organization></organization>
    </author>
    <date year="2024"/>
  </front>
<annotation>IEEE Transactions on Network and Service Management, 21(4), pp. 4450-4465</annotation></reference>
<reference anchor="Hau23" >
  <front>
    <title>A survey on data plane programming with P4: Fundamentals, advances, and applied research</title>
    <author initials="F." surname="Hauser" fullname="F. Hauser">
      <organization></organization>
    </author>
    <author initials="M." surname="Häberle" fullname="M. Häberle">
      <organization></organization>
    </author>
    <author initials="D." surname="Merling" fullname="D. Merling">
      <organization></organization>
    </author>
    <author initials="S." surname="Lindner" fullname="S. Lindner">
      <organization></organization>
    </author>
    <author initials="V." surname="Gurevich" fullname="V. Gurevich">
      <organization></organization>
    </author>
    <author initials="F." surname="Zeiger" fullname="F. Zeiger">
      <organization></organization>
    </author>
    <author initials="R." surname="Frank" fullname="R. Frank">
      <organization></organization>
    </author>
    <author initials="M." surname="Menth" fullname="M. Menth">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
<annotation>Elsevier Journal of Network and Computer Applications (212)</annotation></reference>
<reference anchor="Sha21b" >
  <front>
    <title>A comparative study on online machine learning techniques for network traffic streams analysis</title>
    <author initials="A." surname="Shahraki" fullname="A. Shahraki">
      <organization></organization>
    </author>
    <author initials="M." surname="Abbasi" fullname="M. Abbasi">
      <organization></organization>
    </author>
    <author initials="A." surname="Taherkordi" fullname="A. Taherkordi">
      <organization></organization>
    </author>
    <author initials="A. D." surname="Jurcut," fullname="A. D. Jurcut,">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>Elsevier Computer Networks (207)</annotation></reference>
<reference anchor="Arz21" >
  <front>
    <title>Interpretable Feedback for AutoML and a Proposal for Domain-customized AutoML for Networking</title>
    <author initials="B." surname="Arzani" fullname="B. Arzani">
      <organization></organization>
    </author>
    <author initials="K." surname="Hsieh" fullname="K. Hsieh">
      <organization></organization>
    </author>
    <author initials="H." surname="Chen" fullname="H. Chen">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>ACM Workshop on Hot Topics in Networks (HotNets)</annotation></reference>
<reference anchor="Sah23" >
  <front>
    <title>Deep Reinforcement Learning Approaches to Network Slice Scaling and Placement: A Survey</title>
    <author initials="N." surname="Saha" fullname="N. Saha">
      <organization></organization>
    </author>
    <author initials="M." surname="Zangooei" fullname="M. Zangooei">
      <organization></organization>
    </author>
    <author initials="M." surname="Golkarifard" fullname="M. Golkarifard">
      <organization></organization>
    </author>
    <author initials="R." surname="Boutaba" fullname="R. Boutaba">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
<annotation>IEEE Communications Magazine, 61(2)</annotation></reference>
<reference anchor="Urb23" >
  <front>
    <title>STREAMLINE: A Simple, Transparent, End-To-End Automated Machine Learning Pipeline Facilitating Data Analysis and Algorithm Comparison</title>
    <author initials="R." surname="Urbanowicz" fullname="R. Urbanowicz">
      <organization></organization>
    </author>
    <author initials="R." surname="Zhang" fullname="R. Zhang">
      <organization></organization>
    </author>
    <author initials="Y." surname="Cui" fullname="Y. Cui">
      <organization></organization>
    </author>
    <author initials="P." surname="Suri" fullname="P. Suri">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
<annotation>Genetic Programming Theory and Practice XIX. Genetic and Evolutionary Computation. Springer</annotation></reference>
<reference anchor="Ham23" >
  <front>
    <title>Advancing aspect-based sentiment analysis with a novel architecture combining deep learning models CNN and bi-RNN with the machine learning model SVM</title>
    <author initials="S." surname="Hammi" fullname="S. Hammi">
      <organization></organization>
    </author>
    <author initials="S. M." surname="Hammami" fullname="S. M. Hammami">
      <organization></organization>
    </author>
    <author initials="L.H." surname="Belguith" fullname="L.H. Belguith">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
<annotation>Soc. Netw. Anal. Min., 13(117)</annotation></reference>
<reference anchor="Das23" >
  <front>
    <title>Ensemble Learning Techniques and Their Applications: An Overview</title>
    <author initials="A.K." surname="Dasari" fullname="A.K. Dasari">
      <organization></organization>
    </author>
    <author initials="S. K." surname="Biswas" fullname="S. K. Biswas">
      <organization></organization>
    </author>
    <author initials="D. M." surname="Thounaojam" fullname="D. M. Thounaojam">
      <organization></organization>
    </author>
    <author initials="D." surname="Devi" fullname="D. Devi">
      <organization></organization>
    </author>
    <author initials="B." surname="Purkayastha" fullname="B. Purkayastha">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
<annotation>Advances in Cognitive Science and Communications</annotation></reference>
<reference anchor="Wu24" >
  <front>
    <title>NetLLM: Adapting Large Language Models for Networking</title>
    <author initials="D." surname="Wu" fullname="D. Wu">
      <organization></organization>
    </author>
    <author initials="X." surname="Wang" fullname="X. Wang">
      <organization></organization>
    </author>
    <author initials="Y." surname="Qiao" fullname="Y. Qiao">
      <organization></organization>
    </author>
    <author initials="Z." surname="Wang" fullname="Z. Wang">
      <organization></organization>
    </author>
    <author initials="J." surname="Jiang" fullname="J. Jiang">
      <organization></organization>
    </author>
    <author initials="S." surname="Cui" fullname="S. Cui">
      <organization></organization>
    </author>
    <author initials="F." surname="Wang" fullname="Fangxin Wang">
      <organization></organization>
    </author>
    <date year="2024"/>
  </front>
<annotation>ACM SIGCOMM 2024 Conference</annotation></reference>
<reference anchor="Hua25" >
  <front>
    <title>Large Language Models for Networking: Applications, Enabling Techniques, and Challenges</title>
    <author initials="Y." surname="Huang" fullname="Y. Huang">
      <organization></organization>
    </author>
    <author initials="H." surname="Du" fullname="H. Du">
      <organization></organization>
    </author>
    <author initials="X." surname="Zhang" fullname="X. Zhang">
      <organization></organization>
    </author>
    <author initials="D." surname="Niyato" fullname="D. Niyato">
      <organization></organization>
    </author>
    <author initials="J." surname="Kang" fullname="J. Kang">
      <organization></organization>
    </author>
    <author initials="Z." surname="Xiong" fullname="Z. Xiong">
      <organization></organization>
    </author>
    <date year="2025"/>
  </front>
<annotation>IEEE Network, 39(1)</annotation></reference>
<reference anchor="Gre19" >
  <front>
    <title>Fashion-MNIST classification based on HOG feature descriptor using SVM</title>
    <author initials="K. V." surname="Greeshma" fullname="K. V. Greeshma">
      <organization></organization>
    </author>
    <author initials="K." surname="Sreekumar" fullname="K. Sreekumar">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>Int. J. Innov. Technol. Explor. Eng. 8, 5 (2019)</annotation></reference>
<reference anchor="Sen24" >
  <front>
    <title>A Survey on XAI for 5G and Beyond Security: Technical Aspects, Challenges and Research Directions</title>
    <author initials="T." surname="Senevirathna" fullname="T. Senevirathna">
      <organization></organization>
    </author>
    <author initials="V. H." surname="La" fullname="V. H. La">
      <organization></organization>
    </author>
    <author initials="S." surname="Marchal" fullname="S. Marchal">
      <organization></organization>
    </author>
    <author initials="B." surname="Siniarski" fullname="B. Siniarski">
      <organization></organization>
    </author>
    <author initials="M." surname="Liyanage" fullname="M. Liyanage">
      <organization></organization>
    </author>
    <author initials="S." surname="Wang" fullname="S. Wang">
      <organization></organization>
    </author>
    <date year="2024"/>
  </front>
<annotation>IEEE Communications Surveys &amp; Tutorials</annotation></reference>
<reference anchor="Liu21" >
  <front>
    <title>Constraint-Aware Deep Reinforcement Learning for End-to-End Resource Orchestration in Mobile Networks</title>
    <author initials="Q." surname="Liu" fullname="Q. Liu">
      <organization></organization>
    </author>
    <author initials="N." surname="Choi" fullname="N. Choi">
      <organization></organization>
    </author>
    <author initials="T." surname="Han" fullname="T. Han">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>IEEE International Conference on Network Protocols (ICNP)</annotation></reference>
<reference anchor="Liu22b" >
  <front>
    <title>Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018</title>
    <author initials="L." surname="Liu" fullname="L. Liu">
      <organization></organization>
    </author>
    <author initials="G." surname="Engelen" fullname="G. Engelen">
      <organization></organization>
    </author>
    <author initials="T." surname="Lynar" fullname="T. Lynar">
      <organization></organization>
    </author>
    <author initials="D." surname="Essam" fullname="D. Essam">
      <organization></organization>
    </author>
    <author initials="W." surname="Joosen" fullname="W. Joosen">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>IEEE Conference on Communications and Network Security (CNS)</annotation></reference>
<reference anchor="Hoa21" >
  <front>
    <title>Domain name encryption is not enough: Privacy leakage via IP-based website fingerprinting</title>
    <author initials="N. P." surname="Hoang" fullname="N. P. Hoang">
      <organization></organization>
    </author>
    <author initials="A. A." surname="Niaki" fullname="A. A. Niaki">
      <organization></organization>
    </author>
    <author initials="P." surname="Gill" fullname="P. Gill">
      <organization></organization>
    </author>
    <author initials="M." surname="Polychronakis" fullname="M. Polychronakis">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>Proceedings on Privacy Enhancing Technologies</annotation></reference>
<reference anchor="Liu22" >
  <front>
    <title>When Machine Learning Meets Privacy: A Survey and Outlook</title>
    <author initials="B." surname="Liu" fullname="B. Liu">
      <organization></organization>
    </author>
    <author initials="M." surname="Ding" fullname="M. Ding">
      <organization></organization>
    </author>
    <author initials="S." surname="Shaham" fullname="S. Shaham">
      <organization></organization>
    </author>
    <author initials="W." surname="Rahayu" fullname="W. Rahayu">
      <organization></organization>
    </author>
    <author initials="F." surname="Farokhi" fullname="F. Farokhi">
      <organization></organization>
    </author>
    <author initials="Z." surname="Lin" fullname="Z. Lin">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>ACM Comput. Surv., 54(2)</annotation></reference>
<reference anchor="Jie22" >
  <front>
    <title>Graph-based deep learning for communication networks: A survey</title>
    <author initials="W." surname="Jieng" fullname="W. Jieng">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>Computer Communications, Elsevier, vol. 185</annotation></reference>
<reference anchor="Sha21" >
  <front>
    <title>FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification</title>
    <author initials="T." surname="Shapira" fullname="T. Shapira">
      <organization></organization>
    </author>
    <author initials="Y." surname="Shavitt" fullname="Y. Shavitt">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
<annotation>IEEE Transactions on Network and Service Management, 18(2), pp. 1218-1232</annotation></reference>
<reference anchor="Sul23" >
  <front>
    <title>Coordinated Slicing and Admission Control Using Multi-Agent Deep Reinforcement Learning</title>
    <author initials="M." surname="Sulaiman" fullname="M. Sulaiman">
      <organization></organization>
    </author>
    <author initials="A." surname="Moayyedi" fullname="A. Moayyedi">
      <organization></organization>
    </author>
    <author initials="M." surname="Ahmadi" fullname="M. Ahmadi">
      <organization></organization>
    </author>
    <author initials="M. A." surname="Salahuddin" fullname="M. A. Salahuddin">
      <organization></organization>
    </author>
    <author initials="R." surname="Boutaba" fullname="R. Boutaba">
      <organization></organization>
    </author>
    <author initials="A." surname="Saleh" fullname="A. Saleh">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
<annotation>IEEE Transactions on Network and Service Management, 20(2), pp. 1110-1124</annotation></reference>
<reference anchor="Vin21" >
  <front>
    <title>Timely admission control for network slicing in 5G with machine learning</title>
    <author initials="M." surname="Vincenzi" fullname="M. Vincenzi">
      <organization></organization>
    </author>
    <author initials="E." surname="Lopez-Aguilera" fullname="E. Lopez-Aguilera">
      <organization></organization>
    </author>
    <author initials="E." surname="Garcia-Villegas" fullname="E. Garcia-Villegas">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>IEEE Access</annotation></reference>
<reference anchor="Att23" >
  <front>
    <title>VNF and CNF Placement in 5G: Recent Advances and Future Trends</title>
    <author initials="W." surname="Attaoui" fullname="W. Attaoui">
      <organization></organization>
    </author>
    <author initials="E." surname="Sabir" fullname="E. Sabir">
      <organization></organization>
    </author>
    <author initials="H." surname="Elbiaze" fullname="H. Elbiaze">
      <organization></organization>
    </author>
    <author initials="M." surname="Guizani" fullname="M. Guizani">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
<annotation>IEEE Transactions on Network and Service Management, 20(4), pp. 4698-4733</annotation></reference>
<reference anchor="Col22" >
  <front>
    <title>Using Machine Learning to Improve Interactive Visualizations for Large Collected Traffic Detector Data</title>
    <author initials="A." surname="Collet" fullname="A. Collet">
      <organization></organization>
    </author>
    <author initials="A." surname="Banchs" fullname="A. Banchs">
      <organization></organization>
    </author>
    <author initials="M." surname="Fiore" fullname="M. Fiore">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>IEEE Conference on Computer Communications (Infocom)</annotation></reference>
<reference anchor="Ami24" >
  <front>
    <title>Using Machine Learning to Improve Interactive Visualizations for Large Collected Traffic Detector Data</title>
    <author initials="R. M." surname="Amin" fullname="R. M. Amin">
      <organization></organization>
    </author>
    <author initials="P." surname="Hammer" fullname="P. Hammer">
      <organization></organization>
    </author>
    <author initials="A." surname="Butz" fullname="A. Butz">
      <organization></organization>
    </author>
    <date year="2024"/>
  </front>
<annotation>Proceedings of the 29th International Conference on Intelligent User Interfaces (ITUI'24), ACM</annotation></reference>
<reference anchor="Zha21" >
  <front>
    <title>Network traffic classification for data fusion: A survey</title>
    <author initials="J." surname="Zhao" fullname="J. Zhao">
      <organization></organization>
    </author>
    <author initials="X." surname="Jing" fullname="X. Jing">
      <organization></organization>
    </author>
    <author initials="Z." surname="Yan" fullname="Z. Yan">
      <organization></organization>
    </author>
    <author initials="W." surname="Pedrycz" fullname="W. Pedrycz">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>Information Fusion, Elsevier, vol. 72</annotation></reference>
<reference anchor="Mut24" >
  <front>
    <title>Digital twin (DT)-based predictive maintenance of a 6G communication network</title>
    <author initials="F." surname="Muteba" fullname="F. Muteba">
      <organization></organization>
    </author>
    <author initials="T." surname="Dahanayaka" fullname="T. Dahanayaka">
      <organization></organization>
    </author>
    <author initials="S." surname="Seneviratne" fullname="S. Seneviratne">
      <organization></organization>
    </author>
    <date year="2024"/>
  </front>
<annotation>Procedia Computer Science, Elsevier, vol. 238</annotation></reference>
<reference anchor="Gin24" >
  <front>
    <title>TrafficGPT: An LLM Approach for Open-Set Encrypted Traffic Classification</title>
    <author initials="Y." surname="Ginige" fullname="Y. Ginige">
      <organization></organization>
    </author>
    <author initials="T." surname="Dahanayaka" fullname="T. Dahanayaka">
      <organization></organization>
    </author>
    <author initials="S." surname="Seneviratne" fullname="S. Seneviratne">
      <organization></organization>
    </author>
    <date year="2024"/>
  </front>
<annotation>Asian Internet Engineering Conference</annotation></reference>
<reference anchor="Ake24" >
  <front>
    <title>Encrypted Traffic Classification at Line Rate in Programmable Switches with Machine Learning</title>
    <author initials="A. T. J." surname="Akem" fullname="A. T. J. Akem">
      <organization></organization>
    </author>
    <author initials="G." surname="Fraysse" fullname="G. Fraysse">
      <organization></organization>
    </author>
    <author initials="M." surname="Fiore" fullname="M. Fiore">
      <organization></organization>
    </author>
    <date year="2024"/>
  </front>
<annotation>IEEE/IFIP Network Operations and Management Symposium (NOMS)</annotation></reference>
<reference anchor="Ham21" >
  <front>
    <title>Adversarial Machine Learning for Network Intrusion Detection Systems: A Comprehensive Survey</title>
    <author initials="M." surname="Hamdan" fullname="M. Hamdan">
      <organization></organization>
    </author>
    <author initials="E." surname="Hassan" fullname="E. Hassan">
      <organization></organization>
    </author>
    <author initials="A." surname="Abdelaziz" fullname="A. Abdelaziz">
      <organization></organization>
    </author>
    <author initials="B." surname="Mohammed" fullname="B. Mohammed">
      <organization></organization>
    </author>
    <author initials="S." surname="Khan" fullname="S. Khan">
      <organization></organization>
    </author>
    <author initials="A. V." surname="Vasilakos" fullname="A. V. Vasilakos">
      <organization></organization>
    </author>
    <author initials="M.N." surname="Marsono" fullname="M.N. Marsono">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>Journal of Network and Computer Applications, Elsevier</annotation></reference>
<reference anchor="Sin22" >
  <front>
    <title>Optimization of reinforcement routing for wireless mesh network using machine learning and high-performance computing</title>
    <author initials="A." surname="Singh" fullname="A. Singh">
      <organization></organization>
    </author>
    <author initials="S." surname="Prakash" fullname="S. Prakash">
      <organization></organization>
    </author>
    <author initials="S." surname="Singh" fullname="S. Singh">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>Concurrency Computat Pract Exper., 35(15)</annotation></reference>
<reference anchor="Wan24" >
  <front>
    <title>Combine intra- and inter-flow: A multimodal encrypted traffic classification model driven by diverse features</title>
    <author initials="X." surname="Wang" fullname="X. Wang">
      <organization></organization>
    </author>
    <author initials="Q." surname="Yuan" fullname="Q. Yuan">
      <organization></organization>
    </author>
    <author initials="Y." surname="Wang" fullname="Y. Wang">
      <organization></organization>
    </author>
    <author initials="G." surname="Gou" fullname="G Gou">
      <organization></organization>
    </author>
    <author initials="C." surname="Gu" fullname="C. Gu">
      <organization></organization>
    </author>
    <author initials="G." surname="Yu" fullname="G. Yu">
      <organization></organization>
    </author>
    <author initials="G." surname="Xiong" fullname="G. Xiong">
      <organization></organization>
    </author>
    <date year="2024"/>
  </front>
<annotation>Computer Networks, Elsevier, vol. 245</annotation></reference>
<reference anchor="Naj24" >
  <front>
    <title>Enhanced Network Traffic Classification with Machine Learning Algorithms</title>
    <author initials="I. A." surname="Najm" fullname="I. A. Najm">
      <organization></organization>
    </author>
    <author initials="A. H." surname="Saeed" fullname="A. H. Saeed">
      <organization></organization>
    </author>
    <author initials="B.A." surname="Ahmad" fullname="B.A. Ahmad">
      <organization></organization>
    </author>
    <author initials="S. R." surname="Ahmed" fullname="S. R. Ahmed">
      <organization></organization>
    </author>
    <author initials="R." surname="Sekhar" fullname="R. Sekhar">
      <organization></organization>
    </author>
    <author initials="P." surname="Shah" fullname="P. Shah">
      <organization></organization>
    </author>
    <author initials="B.S." surname="Veena" fullname="B.S. Veena">
      <organization></organization>
    </author>
    <date year="2024"/>
  </front>
<annotation>Proceedings of the Cognitive Models and Artificial Intelligence Conference</annotation></reference>
<reference anchor="Sha25" >
  <front>
    <title>Chapter 26 - Future now: unleashing the potentials of machine learning algorithms in 6G</title>
    <author initials="G." surname="Sharma" fullname="G. Sharma">
      <organization></organization>
    </author>
    <author initials="B." surname="Priya" fullname="B. Priya">
      <organization></organization>
    </author>
    <date year="2025"/>
  </front>
<annotation>Advances in Computational Methods and Modeling for Science and Engineering, Morgan Kaufmann, 331-339</annotation></reference>
<reference anchor="Tan21" >
  <front>
    <title>Comprehensive Survey on Machine Learning in Vehicular Network: Technology, Applications and Challenges</title>
    <author initials="F." surname="Tang" fullname="F. Tang">
      <organization></organization>
    </author>
    <author initials="B." surname="Mao" fullname="B. Mao">
      <organization></organization>
    </author>
    <author initials="N." surname="Kato" fullname="N. Kato">
      <organization></organization>
    </author>
    <author initials="G." surname="Gu" fullname="G. Gu">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
<annotation>IEEE Communications Surveys &amp; Tutorials, 23(3), 2027-2057.</annotation></reference>
<reference anchor="Ke23" >
  <front>
    <title>Adversarial Machine Learning for Network Intrusion Detection Systems: A Comprehensive Survey</title>
    <author initials="H." surname="Ke" fullname="H. Ke">
      <organization></organization>
    </author>
    <author initials="K. D." surname="Dongseong" fullname="K. Dan Dongseong">
      <organization></organization>
    </author>
    <author initials="M. R." surname="Asghar" fullname="M. R. Asghar">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
<annotation>IEEE Communications Surveys &amp; Tutorials, 25(1), 538-566.</annotation></reference>
<reference anchor="Mcc93" >
  <front>
    <title>The BSD packet filter: a new architecture for user-level packet capture</title>
    <author initials="S." surname="McCanne" fullname="Steve McCanne">
      <organization></organization>
    </author>
    <author initials="V." surname="Jacobson" fullname="Van Jacobson">
      <organization></organization>
    </author>
    <date year="1993"/>
  </front>
<annotation>USENIX Winter Conference</annotation></reference>
<reference anchor="Ste92" >
  <front>
    <title>A Diagnosis Expert System for Network Traffic Management</title>
    <author initials="D." surname="Stern" fullname="Daniel Stern">
      <organization></organization>
    </author>
    <author initials="P." surname="Chemouil" fullname="Prosper Chemouil">
      <organization></organization>
    </author>
    <date year="1992"/>
  </front>
<annotation>Networks, Kobe, Japan</annotation></reference>
<reference anchor="Abd10" >
  <front>
    <title>A Diagnosis Expert System for Network Traffic Management</title>
    <author initials="K. A." surname="Jalil" fullname="Kamarularifin Abd Jalil">
      <organization></organization>
    </author>
    <author initials="M. H." surname="Kamarudin" fullname="Muhammad Hilmi Kamarudin">
      <organization></organization>
    </author>
    <author initials="M. N." surname="Masrek" fullname="Mohamad Noorman Masrek">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
<annotation>IEEE international conference on networking and information technology</annotation></reference>
<reference anchor="Beg19" >
  <front>
    <title>DeepCog: Cognitive Network Management in Sliced 5G Networks with Deep Learning</title>
    <author initials="D." surname="Bega" fullname="D. Bega">
      <organization></organization>
    </author>
    <author initials="M." surname="Gramaglia" fullname="M. Gramaglia">
      <organization></organization>
    </author>
    <author initials="M." surname="Fiore" fullname="M. Fiore">
      <organization></organization>
    </author>
    <author initials="A." surname="Banchs" fullname="A. Banchs">
      <organization></organization>
    </author>
    <author initials="X." surname="Costa-Perez" fullname="X. Costa-Perez">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE INFOCOM</annotation></reference>
<reference anchor="Bos13" >
  <front>
    <title>Forwarding metamorphosis: Fast programmable match-action processing in hardware for SDN</title>
    <author initials="P." surname="Bosshart" fullname="Pat Bosshart">
      <organization></organization>
    </author>
    <author initials="G." surname="Gibb" fullname="Glen Gibb">
      <organization></organization>
    </author>
    <author initials="H.-S." surname="Kim" fullname="Hun-Seok Kim">
      <organization></organization>
    </author>
    <author initials="G." surname="Varghese" fullname="George Varghese">
      <organization></organization>
    </author>
    <author initials="N." surname="McKeown" fullname="Nick McKeown">
      <organization></organization>
    </author>
    <author initials="M." surname="Izzard" fullname="Martin Izzard">
      <organization></organization>
    </author>
    <author initials="F." surname="Mujica" fullname="Fernando Mujica">
      <organization></organization>
    </author>
    <author initials="M." surname="Horowitz" fullname="Mark Horowitz">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
<annotation>ACM SIGCOMM</annotation></reference>
<reference anchor="Bos14" >
  <front>
    <title>P4: programming protocol-independent packet processors</title>
    <author initials="P." surname="Bosshart" fullname="Pat Bosshart">
      <organization></organization>
    </author>
    <author initials="D." surname="Daly" fullname="Dan Daly">
      <organization></organization>
    </author>
    <author initials="G." surname="Gibb" fullname="Glen Gibb">
      <organization></organization>
    </author>
    <author initials="M." surname="Izzard" fullname="Martin Izzard">
      <organization></organization>
    </author>
    <author initials="N." surname="McKeown" fullname="Nick McKeown">
      <organization></organization>
    </author>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <author initials="C." surname="Schlesinger" fullname="Cole Schlesinger">
      <organization></organization>
    </author>
    <author initials="D." surname="Talayco" fullname="Dan Talayco">
      <organization></organization>
    </author>
    <author initials="A." surname="Vahdat" fullname="Amin Vahdat">
      <organization></organization>
    </author>
    <author initials="G." surname="Varghese" fullname="George Varghese">
      <organization></organization>
    </author>
    <author initials="D." surname="Walker" fullname="David Walker">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>SIGCOMM Comput. Commun. Rev. 44</annotation></reference>
<reference anchor="Dat18" >
  <front>
    <title>P4Guard: Designing P4 Based Firewall</title>
    <author initials="R." surname="Datta" fullname="R. Datta">
      <organization></organization>
    </author>
    <author initials="S." surname="Choi" fullname="S. Choi">
      <organization></organization>
    </author>
    <author initials="A." surname="Chowdhary" fullname="A. Chowdhary">
      <organization></organization>
    </author>
    <author initials="Y." surname="Park," fullname="Y. Park,">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Military Communications Conference (MILCOM)</annotation></reference>
<reference anchor="Che19" >
  <front>
    <title>P4-Enabled Bandwidth Management</title>
    <author initials="Y." surname="Chen" fullname="Y. Chen">
      <organization></organization>
    </author>
    <author initials="L." surname="Yen" fullname="L. Yen">
      <organization></organization>
    </author>
    <author initials="W." surname="Wang" fullname="W. Wang">
      <organization></organization>
    </author>
    <author initials="C." surname="Chuang" fullname="C. Chuang">
      <organization></organization>
    </author>
    <author initials="Y." surname="Liu" fullname="Y. Liu">
      <organization></organization>
    </author>
    <author initials="C." surname="Tseng" fullname="C. Tseng">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>Asia-Pacific Network Operations and Management Symposium (APNOMS)</annotation></reference>
<reference anchor="Cha18" >
  <front>
    <title>Oko: Extending Open vSwitch with Stateful Filters</title>
    <author initials="P." surname="Chaignon" fullname="Paul Chaignon">
      <organization></organization>
    </author>
    <author initials="K." surname="Lazri" fullname="Kahina Lazri">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="T." surname="Delmas" fullname="Thibault Delmas">
      <organization></organization>
    </author>
    <author initials="O." surname="Festor" fullname="Olivier Festor">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM Symposium on SDN Research (SOSR)</annotation></reference>
<reference anchor="czb20" >
  <front>
    <title>Network Management 2030: Operations and Control of Network 2030 Services</title>
    <author initials="A." surname="Clemm" fullname="A. Clemm">
      <organization></organization>
    </author>
    <author initials="M. F." surname="Zhani" fullname="M. F. Zhani">
      <organization></organization>
    </author>
    <author initials="R." surname="Boutaba" fullname="R. Boutaba">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Springer Journal of Network and Systems Management (JNSM)</annotation></reference>
<reference anchor="Hua19" >
  <front>
    <title>Addressing the Loss-Metric Mismatch with Adaptive Loss Alignment</title>
    <author initials="C." surname="Huang" fullname="Chen Huang">
      <organization></organization>
    </author>
    <author initials="S." surname="Zhai" fullname="Shuangfei Zhai">
      <organization></organization>
    </author>
    <author initials="W." surname="Talbott" fullname="Walter Talbott">
      <organization></organization>
    </author>
    <author initials="M. A." surname="Bautista" fullname="Miguel Angel Bautista">
      <organization></organization>
    </author>
    <author initials="S.-Y." surname="Sun" fullname="Shih-Yu Sun">
      <organization></organization>
    </author>
    <author initials="C." surname="Guestrin" fullname="Carlos Guestrin">
      <organization></organization>
    </author>
    <author initials="J." surname="Susskind" fullname="Josh Susskind">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>ICRL</annotation></reference>
<reference anchor="Jos22" >
  <front>
    <title>NetREC Network-wide in-network REal-value Computation.</title>
    <author initials="M." surname="Jose" fullname="Matthews Jose">
      <organization></organization>
    </author>
    <author initials="K." surname="Lazri" fullname="Kahina Lazri">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="O." surname="Festor" fullname="Olivier Festor">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>IEEE International Conference on Network Softwarization (NetSoft)</annotation></reference>
<reference anchor="Lee21" >
  <front>
    <title>Feedback-efficient interactive reinforcement learning via relabeling experience and unsupervised pre-training</title>
    <author initials="K." surname="Lee" fullname="K. Lee">
      <organization></organization>
    </author>
    <author initials="L." surname="Smith" fullname="L. Smith">
      <organization></organization>
    </author>
    <author initials="P." surname="Abbeel" fullname="P. Abbeel">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>arXiv preprint arXiv:2106.05091</annotation></reference>
<reference anchor="Liu16" >
  <front>
    <title>One Sketch to Rule Them All: Rethinking Network Flow Monitoring with UnivMon</title>
    <author initials="Z." surname="Liu" fullname="Zaoxing Liu">
      <organization></organization>
    </author>
    <author initials="A." surname="Manousis" fullname="Antonis Manousis">
      <organization></organization>
    </author>
    <author initials="G." surname="Vorsanger" fullname="Gregory Vorsanger">
      <organization></organization>
    </author>
    <author initials="V." surname="Sekar" fullname="Vyas Sekar">
      <organization></organization>
    </author>
    <author initials="V." surname="Braverman" fullname="Vladimir Braverman">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Yan18" >
  <front>
    <title>Elastic sketch: adaptive and fast network-wide measurements</title>
    <author initials="T." surname="Yang" fullname="Tong Yang">
      <organization></organization>
    </author>
    <author initials="J." surname="Jiang" fullname="Jie Jiang">
      <organization></organization>
    </author>
    <author initials="P." surname="Liu" fullname="Peng Liu">
      <organization></organization>
    </author>
    <author initials="Q." surname="Huang" fullname="Qun Huang">
      <organization></organization>
    </author>
    <author initials="J." surname="Gong" fullname="Junzhi Gong">
      <organization></organization>
    </author>
    <author initials="Y." surname="Zhou" fullname="Yang Zhou">
      <organization></organization>
    </author>
    <author initials="R." surname="Miao" fullname="Rui Miao">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xiaoming Li">
      <organization></organization>
    </author>
    <author initials="S." surname="Uhlig" fullname="Steve Uhlig">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Gup18" >
  <front>
    <title>Sonata: query-driven streaming network telemetry</title>
    <author initials="A." surname="Gupta" fullname="Arpit Gupta">
      <organization></organization>
    </author>
    <author initials="R." surname="Harrison" fullname="Rob Harrison">
      <organization></organization>
    </author>
    <author initials="M." surname="Canini" fullname="Marco Canini">
      <organization></organization>
    </author>
    <author initials="N." surname="Feamster" fullname="Nick Feamster">
      <organization></organization>
    </author>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <author initials="W." surname="Willinger" fullname="Walter Willinger">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Mar18" >
  <front>
    <title>Exploiting External Events for Resource Adaptation in Virtual Computer and Network Systems</title>
    <author initials="P." surname="Martinez-Julia" fullname="Pedro Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="V. P." surname="Kafle" fullname="Ved P. Kafle">
      <organization></organization>
    </author>
    <author initials="H." surname="Harai" fullname="Hiroaki Harai">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Transactions on Network and Service Management, Vol. 15, N. 2,</annotation></reference>
<reference anchor="Mar20" >
  <front>
    <title>Explained Intelligent Management Decisions in Virtual Networks and Network Slices</title>
    <author initials="P." surname="Martinez-Julia" fullname="Pedro Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="V. P." surname="Kafle" fullname="Ved P. Kafle">
      <organization></organization>
    </author>
    <author initials="H." surname="Asaeda" fullname="H. Asaeda">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)</annotation></reference>
<reference anchor="Mus18" >
  <front>
    <title>An overview on application of machine learning techniques in optical networks</title>
    <author initials="F." surname="Musumeci" fullname="F. Musumeci">
      <organization></organization>
    </author>
    <author initials="C." surname="Rottondi" fullname="C. Rottondi">
      <organization></organization>
    </author>
    <author initials="A." surname="Nag" fullname="A. Nag">
      <organization></organization>
    </author>
    <author initials="I." surname="Macaluso" fullname="I. Macaluso">
      <organization></organization>
    </author>
    <author initials="D." surname="Zibar" fullname="D. Zibar">
      <organization></organization>
    </author>
    <author initials="M." surname="Ruffini" fullname="M. Ruffini">
      <organization></organization>
    </author>
    <author initials="M." surname="Tornatore" fullname="M. Tornatore">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Communications Surveys &amp; Tutorials, 21(2), 1383-1408.</annotation></reference>
<reference anchor="Ngu20" >
  <front>
    <title>Efficient SDN-based traffic monitoring in IoT networks with double deep Q-network</title>
    <author initials="T. G." surname="Nguyen" fullname="T. G. Nguyen">
      <organization></organization>
    </author>
    <author initials="T. V." surname="Phan" fullname="T. V. Phan">
      <organization></organization>
    </author>
    <author initials="D. T." surname="Hoang" fullname="D. T. Hoang">
      <organization></organization>
    </author>
    <author initials="T. N." surname="Nguyen" fullname="T. N. Nguyen">
      <organization></organization>
    </author>
    <author initials="C." surname="So-In" fullname="C. So-In">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>International conference on computational data and social networks, Springer</annotation></reference>
<reference anchor="Tan20" >
  <front>
    <title>Classification-assisted Query Processing for Network Telemetry</title>
    <author initials="G." surname="Tangari" fullname="G. Tangari">
      <organization></organization>
    </author>
    <author initials="M." surname="Charalambides" fullname="M. Charalambides">
      <organization></organization>
    </author>
    <author initials="G." surname="Pavlou" fullname="G. Pavlou">
      <organization></organization>
    </author>
    <author initials="C." surname="Grazian" fullname="C. Grazian">
      <organization></organization>
    </author>
    <author initials="D." surname="Tuncer" fullname="D. Tuncer">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Network Traffic Measurement and Analysis Conference (TMA)</annotation></reference>
<reference anchor="Tan20b" >
  <front>
    <title>In-band Network Telemetry: A Survey</title>
    <author initials="T." surname="Lizhuang" fullname="Tan, Lizhuang">
      <organization></organization>
    </author>
    <author initials="S." surname="Wei" fullname="Su, Wei">
      <organization></organization>
    </author>
    <author initials="Z." surname="Zhenyi" fullname="Zhang, Zhenyi">
      <organization></organization>
    </author>
    <author initials="M." surname="Jingying" fullname="Miao, Jingying">
      <organization></organization>
    </author>
    <author initials="L." surname="Xiaoxi" fullname="Liu, Xiaoxi">
      <organization></organization>
    </author>
    <author initials="L." surname="Na" fullname="Li, Na">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Computer Networks. 186. 10.1016</annotation></reference>
<reference anchor="Val17" >
  <front>
    <title>Learning to route</title>
    <author initials="V." surname="A." fullname="Valadarsky, A.">
      <organization></organization>
    </author>
    <author initials="S." surname="M." fullname="Schapira, M.">
      <organization></organization>
    </author>
    <author initials="S." surname="D." fullname="Shahaf, D.">
      <organization></organization>
    </author>
    <author initials="T." surname="A." fullname="Tamar, A.">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>ACM HotNets</annotation></reference>
<reference anchor="Xu18" >
  <front>
    <title>Experience-driven networking: A deep reinforcement learning based approach</title>
    <author initials="X." surname="Z." fullname="Xu, Z.">
      <organization></organization>
    </author>
    <author initials="T." surname="J." fullname="Tang J.">
      <organization></organization>
    </author>
    <author initials="M." surname="J." fullname="Meng, J.">
      <organization></organization>
    </author>
    <author initials="Z." surname="W." fullname="Zhang, W.">
      <organization></organization>
    </author>
    <author initials="W." surname="Y." fullname="Wang, Y.">
      <organization></organization>
    </author>
    <author initials="L. C." surname="H." fullname="Liu, C. H.">
      <organization></organization>
    </author>
    <author initials="Y." surname="D." fullname="Yang, D.">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE INFOCOM</annotation></reference>
<reference anchor="tl1" >
  <front>
    <title>Transfer learning</title>
    <author initials="L." surname="Torrey" fullname="Lisa Torrey">
      <organization></organization>
    </author>
    <author initials="J." surname="Shavlik" fullname="Jude Shavlik">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
<annotation>Handbook of research on machine learning applications and trends: algorithms, methods, and techniques</annotation></reference>
<reference anchor="gnn1" >
  <front>
    <title>Relational inductive biases, deep learning, and graph networks</title>
    <author initials="P. W." surname="Battaglia" fullname="Peter W. Battaglia">
      <organization></organization>
    </author>
    <author initials="E." surname="al" fullname="Et. al">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>arXiv preprint arXiv:1806.01261</annotation></reference>
<reference anchor="gnn2" >
  <front>
    <title>Unveiling the potential of Graph Neural Networks for network modeling and optimization in SDN</title>
    <author initials="K." surname="Rusek" fullname="K. Rusek">
      <organization></organization>
    </author>
    <author initials="J." surname="Suárez-Varela" fullname="J. Suárez-Varela">
      <organization></organization>
    </author>
    <author initials="A." surname="Mestres" fullname="A. Mestres">
      <organization></organization>
    </author>
    <author initials="P." surname="Barlet-Ros" fullname="P. Barlet-Ros">
      <organization></organization>
    </author>
    <author initials="A." surname="Cabellos-Aparicio" fullname="A. Cabellos-Aparicio">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>ACM Symposium on SDN Research</annotation></reference>
<reference anchor="Rex06" >
  <front>
    <title>Route optimization in IP networks</title>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <date year="2006"/>
  </front>
<annotation>Handbook of Optimization in Telecommunications (pp. 679-700), Springer</annotation></reference>
<reference anchor="Kr14" >
  <front>
    <title>Software-defined networking: A comprehensive survey</title>
    <author initials="D." surname="Kreutz" fullname="D. Kreutz">
      <organization></organization>
    </author>
    <author initials="F. M." surname="Ramos" fullname="F. M. Ramos">
      <organization></organization>
    </author>
    <author initials="P. E." surname="Verissimo" fullname="P. E. Verissimo">
      <organization></organization>
    </author>
    <author initials="C. E." surname="Rothenberg" fullname="C. E. Rothenberg">
      <organization></organization>
    </author>
    <author initials="S." surname="Azodolmolky" fullname="S. Azodolmolky">
      <organization></organization>
    </author>
    <author initials="S." surname="Uhlig" fullname="S. Uhlig">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<annotation>Proceedings of the IEEE, vol. 103, no. 1, pp. 14-76</annotation></reference>
<reference anchor="XAI" >
  <front>
    <title>Explainable artificial intelligence: Understanding, visualizing and interpreting deep learning models</title>
    <author initials="W." surname="Samek" fullname="Wojciech Samek">
      <organization></organization>
    </author>
    <author initials="T." surname="Wiegand" fullname="Thomas Wiegand">
      <organization></organization>
    </author>
    <author initials="K.-R." surname="Müller" fullname="Klaus-Robert Müller">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>arXiv preprint arXiv:1708.08296</annotation></reference>
<reference anchor="Zil20" >
  <front>
    <title>Interpreting Deep Learning-Based Networking Systems</title>
    <author initials="Z." surname="Meng" fullname="Zili Meng">
      <organization></organization>
    </author>
    <author initials="M." surname="Wang" fullname="Minhu Wang">
      <organization></organization>
    </author>
    <author initials="J." surname="Bai" fullname="Jiasong Bai">
      <organization></organization>
    </author>
    <author initials="M." surname="Xu" fullname="Mingwei Xu">
      <organization></organization>
    </author>
    <author initials="H." surname="Mao" fullname="Hongzi Mao">
      <organization></organization>
    </author>
    <author initials="H." surname="Hu" fullname="Hongxin Hu">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>ACM SIGCOMM</annotation></reference>
<reference anchor="Mor18" >
  <front>
    <title>Ray: A Distributed Framework for Emerging AI Applications</title>
    <author initials="P." surname="Moritz" fullname="Philipp Moritz">
      <organization></organization>
    </author>
    <author initials="R." surname="Nishihara" fullname="Robert Nishihara">
      <organization></organization>
    </author>
    <author initials="S." surname="Wang" fullname="Stephanie Wang">
      <organization></organization>
    </author>
    <author initials="A." surname="Tumanov" fullname="Alexey Tumanov">
      <organization></organization>
    </author>
    <author initials="R." surname="Liaw" fullname="Richard Liaw">
      <organization></organization>
    </author>
    <author initials="E." surname="Liang" fullname="Eric Liang">
      <organization></organization>
    </author>
    <author initials="M." surname="Elibol" fullname="Melih Elibol">
      <organization></organization>
    </author>
    <author initials="Z." surname="Yang" fullname="Zongheng Yang">
      <organization></organization>
    </author>
    <author initials="W." surname="Paul" fullname="William Paul">
      <organization></organization>
    </author>
    <author initials="M." surname="Jordan" fullname="Michael Jordan">
      <organization></organization>
    </author>
    <author initials="I." surname="Stoica" fullname="Ion Stoica">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>USENIX Symposium on Operating Systems Design and Implementation (OSDI)</annotation></reference>
<reference anchor="Puj21" >
  <front>
    <title>NetXplain: Real-time explainability of Graph Neural Networks applied to Computer Networks</title>
    <author initials="D." surname="Pujol-Perich" fullname="David Pujol-Perich">
      <organization></organization>
    </author>
    <author initials="J." surname="Suárez-Varela" fullname="José Suárez-Varela">
      <organization></organization>
    </author>
    <author initials="S." surname="Xiao" fullname="Shihan Xiao">
      <organization></organization>
    </author>
    <author initials="B." surname="Wu" fullname="Bo Wu">
      <organization></organization>
    </author>
    <author initials="A." surname="Cabello" fullname="Albert Cabello">
      <organization></organization>
    </author>
    <author initials="P." surname="Barlet-Ros" fullname="Pere Barlet-Ros">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>MLSys workshop on Graph Neural Networks and Systems (GNNSys)</annotation></reference>
<reference anchor="Li19" >
  <front>
    <title>A Framework for Qualitative Communications Using Big Packet Protocol</title>
    <author initials="R." surname="Li" fullname="Richard Li">
      <organization></organization>
    </author>
    <author initials="K." surname="Makhijani" fullname="Kiran Makhijani">
      <organization></organization>
    </author>
    <author initials="H." surname="Yousefi" fullname="Hamed Yousefi">
      <organization></organization>
    </author>
    <author initials="C." surname="Westphal" fullname="Cedric Westphal">
      <organization></organization>
    </author>
    <author initials="L." surname="Dong" fullname="Lijun Dong">
      <organization></organization>
    </author>
    <author initials="T." surname="Wauters" fullname="Tim Wauters">
      <organization></organization>
    </author>
    <author initials="F. D." surname="Turck." fullname="Filip De Turck.">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>ACM SIGCOMM Workshop on Networking for Emerging Applications and Technologies (NEAT)</annotation></reference>
<reference anchor="Hir15" >
  <front>
    <title>Crowdsourced network measurements: Benefits and best practices</title>
    <author initials="M." surname="Hirth" fullname="Matthias Hirth">
      <organization></organization>
    </author>
    <author initials="T." surname="Hossfeld" fullname="Tobias Hossfeld">
      <organization></organization>
    </author>
    <author initials="M." surname="Mellia" fullname="Marco Mellia">
      <organization></organization>
    </author>
    <author initials="C." surname="Schwartz" fullname="Christian Schwartz">
      <organization></organization>
    </author>
    <author initials="F." surname="Lehrieder" fullname="Frank Lehrieder">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<annotation>Computer Networks. 90</annotation></reference>
<reference anchor="Bri19" >
  <front>
    <title>Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic</title>
    <author initials="P.-O." surname="Brissaud" fullname="Pierre-Olivier Brissaud">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="I." surname="Chrisment" fullname="Isabelle Chrisment">
      <organization></organization>
    </author>
    <author initials="T." surname="Cholez" fullname="Thibault Cholez">
      <organization></organization>
    </author>
    <author initials="O." surname="Bettan" fullname="Olivier Bettan">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE Transactions on Network and Service Management, 16 (3)</annotation></reference>
<reference anchor="Hoo18" >
  <front>
    <title>Updated Taxonomy for the Network and Service Management Research Field</title>
    <author initials="J. V. D." surname="Hooft" fullname="Jeroen Van Der Hooft">
      <organization></organization>
    </author>
    <author initials="M." surname="Claeys" fullname="Maxim Claeys">
      <organization></organization>
    </author>
    <author initials="N." surname="Bouten" fullname="Niels Bouten">
      <organization></organization>
    </author>
    <author initials="T." surname="Wauters" fullname="Tim Wauters">
      <organization></organization>
    </author>
    <author initials="J." surname="Schönwälder" fullname="Jürgen Schönwälder">
      <organization></organization>
    </author>
    <author initials="A. P. B." surname="Stiller" fullname="Aiko Pras, Burkhard Stiller">
      <organization></organization>
    </author>
    <author initials="M." surname="Charalambides" fullname="Marinos Charalambides">
      <organization></organization>
    </author>
    <author initials="R." surname="Badonnel" fullname="Rémi Badonnel">
      <organization></organization>
    </author>
    <author initials="J." surname="Serrat" fullname="Joan Serrat">
      <organization></organization>
    </author>
    <author initials="C. R. P. D." surname="Santos" fullname="Carlos Raniery Paula Dos Santos">
      <organization></organization>
    </author>
    <author initials="F. D." surname="Turck" fullname="Filip De Turck">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>Journal of Network System Management (JNSM) 26, 790–808</annotation></reference>
<reference anchor="Bou18" >
  <front>
    <title>A comprehensive survey on machine learning for networking: evolution, applications and research opportunities</title>
    <author initials="R." surname="Boutaba" fullname="Raouf Boutaba">
      <organization></organization>
    </author>
    <author initials="M. A." surname="Salahuddin" fullname="Mohammad A. Salahuddin">
      <organization></organization>
    </author>
    <author initials="N." surname="Limam" fullname="Noura Limam">
      <organization></organization>
    </author>
    <author initials="S." surname="Ayoubi" fullname="Sara Ayoubi">
      <organization></organization>
    </author>
    <author initials="N." surname="Shahriar" fullname="Nashid Shahriar">
      <organization></organization>
    </author>
    <author initials="F." surname="Estrada-Solano" fullname="Felipe Estrada-Solano">
      <organization></organization>
    </author>
    <author initials="O. M." surname="Caicedo" fullname="Oscar M. Caicedo">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>Journal of Internet Services and Applications 9, 16</annotation></reference>
<reference anchor="Kaf19" >
  <front>
    <title>Automation of 5G Network Slice Control Functions with Machine Learning</title>
    <author initials="V. P." surname="Kafle" fullname="V. P. Kafle">
      <organization></organization>
    </author>
    <author initials="P." surname="Martinez-Julia" fullname="P. Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="T." surname="Miyazawa" fullname="T. Miyazawa">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE Communications Standards Magazine, vol. 3, no. 3, pp. 54-62</annotation></reference>
<reference anchor="Yan20" >
  <front>
    <title>Artificial-Intelligence-Enabled Intelligent 6G Networks</title>
    <author initials="H." surname="Yang" fullname="H. Yang">
      <organization></organization>
    </author>
    <author initials="A." surname="Alphones" fullname="A. Alphones">
      <organization></organization>
    </author>
    <author initials="Z." surname="Xiong" fullname="Z. Xiong">
      <organization></organization>
    </author>
    <author initials="D." surname="Niyato" fullname="D. Niyato">
      <organization></organization>
    </author>
    <author initials="J." surname="Zhao" fullname="J. Zhao">
      <organization></organization>
    </author>
    <author initials="K." surname="Wu," fullname="K. Wu,">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE Network, vol. 34, no. 6, pp. 272-280</annotation></reference>
<reference anchor="Lop20" >
  <front>
    <title>Priority Flow Admission and Routing in SDN: Exact and Heuristic Approaches</title>
    <author initials="J." surname="López" fullname="J. López">
      <organization></organization>
    </author>
    <author initials="M." surname="Labonne" fullname="M. Labonne">
      <organization></organization>
    </author>
    <author initials="C." surname="Poletti" fullname="C. Poletti">
      <organization></organization>
    </author>
    <author initials="D." surname="Belabed" fullname="D. Belabed">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE International Symposium on Network Computing and Applications (NCA)</annotation></reference>
<reference anchor="Sen04" >
  <front>
    <title>Accurate, scalable in-network identification of p2p traffic using application signatures</title>
    <author initials="S." surname="Sen" fullname="Subhabrata Sen">
      <organization></organization>
    </author>
    <author initials="O." surname="Spatscheck" fullname="Oliver Spatscheck">
      <organization></organization>
    </author>
    <author initials="D." surname="Wang" fullname="Dongmei Wang">
      <organization></organization>
    </author>
    <date year="2004"/>
  </front>
<annotation>ACM International conference on World Wide Web (WWW)</annotation></reference>
<reference anchor="Rin17" >
  <front>
    <title>IP2Vec: Learning Similarities Between IP Addresses</title>
    <author initials="M." surname="Ring" fullname="M. Ring">
      <organization></organization>
    </author>
    <author initials="A." surname="Dallmann" fullname="A. Dallmann">
      <organization></organization>
    </author>
    <author initials="D." surname="Landes" fullname="D. Landes">
      <organization></organization>
    </author>
    <author initials="A." surname="Hotho" fullname="A. Hotho">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>IEEE International Conference on Data Mining Workshops (ICDMW)</annotation></reference>
<reference anchor="Evr19" >
  <front>
    <title>port2dist: Semantic Port Distances for Network Analytics</title>
    <author initials="L." surname="Evrard" fullname="Laurent Evrard">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="J.-N." surname="Colin" fullname="Jean-Noël Colin">
      <organization></organization>
    </author>
    <author initials="F." surname="Beck" fullname="Frédéric Beck">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IFIP/IEEE Symposium on Integrated Network and Service Management (IM)</annotation></reference>
<reference anchor="Sol20" >
  <front>
    <title>A Graph Neural Network Approach for Scalable and Dynamic IP Similarity in Enterprise Networks</title>
    <author initials="H. M." surname="Soliman" fullname="Hazem M. Soliman">
      <organization></organization>
    </author>
    <author initials="G." surname="Salmon" fullname="Geoff Salmon">
      <organization></organization>
    </author>
    <author initials="D." surname="Sovilij" fullname="Dusan Sovilij">
      <organization></organization>
    </author>
    <author initials="M." surname="Rao" fullname="Mohan Rao">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE International Conference on Cloud Networking (CloudNet)</annotation></reference>
<reference anchor="Sco11" >
  <front>
    <title>On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses</title>
    <author initials="S. E." surname="Coull" fullname="Scott E. Coull">
      <organization></organization>
    </author>
    <author initials="F." surname="Monrose" fullname="Fabian Monrose">
      <organization></organization>
    </author>
    <author initials="M." surname="Bailey" fullname="Michael Bailey">
      <organization></organization>
    </author>
    <date year="2011"/>
  </front>
<annotation>NDSS</annotation></reference>
<reference anchor="Xie18" >
  <front>
    <title>A survey of machine learning techniques applied to software defined networking (SDN): Research issues and challenges</title>
    <author initials="J." surname="Xie" fullname="Junfeng Xie">
      <organization></organization>
    </author>
    <author initials="F. R." surname="Yu" fullname="F. Richard Yu">
      <organization></organization>
    </author>
    <author initials="T." surname="Huang" fullname="Tao Huang">
      <organization></organization>
    </author>
    <author initials="R." surname="Xie" fullname="Renchao Xie">
      <organization></organization>
    </author>
    <author initials="J." surname="Liu" fullname="Jiang Liu">
      <organization></organization>
    </author>
    <author initials="C." surname="Wang" fullname="Chenmeng Wang">
      <organization></organization>
    </author>
    <author initials="Y." surname="Liu" fullname="Yunjie Liu">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Communications Surveys &amp; Tutorials</annotation></reference>
<reference anchor="Yu14" >
  <front>
    <title>Distributed and collaborative traffic monitoring in software defined networks</title>
    <author initials="Y." surname="Yu" fullname="Ye Yu">
      <organization></organization>
    </author>
    <author initials="C." surname="Qian" fullname="Chen Qian">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xin Li">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>ACM Hot topics in software defined networking</annotation></reference>
<reference anchor="Dij19" >
  <front>
    <title>A Survey of Network Traffic Anonymisation Techniques and Implementations</title>
    <author initials="N. V." surname="Dijkhuizen" fullname="Niels Van Dijkhuizen">
      <organization></organization>
    </author>
    <author initials="J. V. D." surname="Ham" fullname="Jeroen Van Der Ham">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xin Li">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>ACM Comput. Surv. 51, 3, Article 52</annotation></reference>
<reference anchor="Sch21" >
  <front>
    <title>Distributed Online Service Coordination Using Deep Reinforcement Learning</title>
    <author initials="S." surname="Schneider" fullname="Stefan Schneider">
      <organization></organization>
    </author>
    <author initials="H." surname="Qarawlus" fullname="Haydar Qarawlus">
      <organization></organization>
    </author>
    <author initials="H." surname="Karl" fullname="Holger Karl">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>IEEE International Conference on Distributed Computing Systems (ICDCS)</annotation></reference>
<reference anchor="Hui22" >
  <front>
    <title>Knowledge Enhanced GAN for IoT Traffic Generation</title>
    <author initials="S." surname="Hui" fullname="Shuodi Hui">
      <organization></organization>
    </author>
    <author initials="H." surname="Wang" fullname="Huandong Wang">
      <organization></organization>
    </author>
    <author initials="Z." surname="Wang" fullname="Zhenhua Wang">
      <organization></organization>
    </author>
    <author initials="X." surname="Yang" fullname="Xinghao Yang">
      <organization></organization>
    </author>
    <author initials="Z." surname="Liu" fullname="Zhongjin Liu">
      <organization></organization>
    </author>
    <author initials="D." surname="Jin" fullname="Depeng Jin">
      <organization></organization>
    </author>
    <author initials="Y." surname="Li" fullname="Yong Li">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>ACM Web Conference 2022 (WWW)</annotation></reference>
<reference anchor="Sil16" >
  <front>
    <title>Mastering the game of Go with deep neural networks and tree search</title>
    <author initials="D." surname="Silver" fullname="David Silver">
      <organization></organization>
    </author>
    <author initials="A." surname="Huang" fullname="Aja Huang">
      <organization></organization>
    </author>
    <author initials="C. J." surname="Maddison" fullname="Christopher J. Maddison">
      <organization></organization>
    </author>
    <author initials="A." surname="Guez" fullname="Arthur Guez">
      <organization></organization>
    </author>
    <author initials="L." surname="Sifre" fullname="Laurent Sifre">
      <organization></organization>
    </author>
    <author initials="G. V. D." surname="Driessche" fullname="George Van Den Driessche">
      <organization></organization>
    </author>
    <author initials="J." surname="Schrittwieser" fullname="Julian Schrittwieser">
      <organization></organization>
    </author>
    <author initials="I." surname="Antonoglou" fullname="Ioannis Antonoglou">
      <organization></organization>
    </author>
    <author initials="V." surname="Panneershelvam" fullname="Veda Panneershelvam">
      <organization></organization>
    </author>
    <author initials="M." surname="Lanctot" fullname="Marc Lanctot">
      <organization></organization>
    </author>
    <author initials="S." surname="Dieleman" fullname="Sander Dieleman">
      <organization></organization>
    </author>
    <author initials="D." surname="Grewe" fullname="Dominik Grewe">
      <organization></organization>
    </author>
    <author initials="J." surname="Nham" fullname="John Nham">
      <organization></organization>
    </author>
    <author initials="D." surname="Silver" fullname="David Silver">
      <organization></organization>
    </author>
    <author initials="I." surname="Sutskever" fullname="Ilya Sutskever">
      <organization></organization>
    </author>
    <author initials="T." surname="Lillicrap" fullname="Timothy Lillicrap">
      <organization></organization>
    </author>
    <author initials="M." surname="Leach" fullname="Madeleine Leach">
      <organization></organization>
    </author>
    <author initials="K." surname="Kavukcuoglu" fullname="Koray Kavukcuoglu">
      <organization></organization>
    </author>
    <author initials="T." surname="Graepel" fullname="Thore Graepel">
      <organization></organization>
    </author>
    <author initials="D." surname="Hassabis" fullname="Demis Hassabis">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
<annotation>Nature, vol. 529 (2016), pp. 484-503</annotation></reference>
<reference anchor="Nas21" >
  <front>
    <title>Defeating DNN-Based Traffic Analysis Systems inReal-Time With Blind Adversarial Perturbations</title>
    <author initials="M." surname="Nasr" fullname="M. Nasr">
      <organization></organization>
    </author>
    <author initials="A." surname="Bahramali" fullname="A. Bahramali">
      <organization></organization>
    </author>
    <author initials="A." surname="Houmansadr" fullname="A. Houmansadr">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>USENIX Security Symposium</annotation></reference>
<reference anchor="Jmi22" >
  <front>
    <title>Adversarial machine learning for network intrusion detection: A comparative study</title>
    <author initials="H." surname="Jmila" fullname="H. Jmila">
      <organization></organization>
    </author>
    <author initials="M. I." surname="Khedher" fullname="M. I. Khedher">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>Computer Networks</annotation></reference>
<reference anchor="Fre15" >
  <front>
    <title>Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures</title>
    <author initials="M." surname="Fredrikson" fullname="M. Fredrikson">
      <organization></organization>
    </author>
    <author initials="M. S." surname="Jha" fullname="M. S. Jha">
      <organization></organization>
    </author>
    <author initials="T." surname="Ristenpart" fullname="T. Ristenpart">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<annotation>ACM SIGSAC Conference on Computer and Communications Security</annotation></reference>
<reference anchor="Bis23" >
  <front>
    <title>Hyperparameter optimization: Foundations, algorithms, best practices, and open challenges</title>
    <author initials="B." surname="Bischl" fullname="B. Bischl">
      <organization></organization>
    </author>
    <author initials="M." surname="Binder" fullname="M. Binder">
      <organization></organization>
    </author>
    <author initials="M." surname="Lang" fullname="M. Lang">
      <organization></organization>
    </author>
    <author initials="T." surname="Pielok" fullname="T. Pielok">
      <organization></organization>
    </author>
    <author initials="J." surname="Richter" fullname="J. Richter">
      <organization></organization>
    </author>
    <author initials="S." surname="Coors" fullname="S. Coors">
      <organization></organization>
    </author>
    <author initials="J." surname="Thomas" fullname="J. Thomas">
      <organization></organization>
    </author>
    <author initials="T." surname="Ullmann" fullname="T. Ullmann">
      <organization></organization>
    </author>
    <author initials="M." surname="Becker" fullname="M. Becker">
      <organization></organization>
    </author>
    <author initials="A.-L." surname="Boulesteix" fullname="A.-L. Boulesteix">
      <organization></organization>
    </author>
    <author initials="D." surname="Deng" fullname="D. Deng">
      <organization></organization>
    </author>
    <author initials="M." surname="Lindauer" fullname="M. Lindauer">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
<annotation>Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 13(2)</annotation></reference>


    </references>


<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>This document is the result of a collective work. Authors of this document are the main contributors and the editors, but contributions have been also received from the following people we acknowledge Laurent Ciavaglia, Felipe Alencar Lopes, Abdelkader Lahamdi, Albert Cabellos, José Suárez-Varela, Marinos Charalambides, Ramin Sadre, Pedro Martinez-Julia and Flavio Esposito</t>

<t>This document was also partially supported by project AI@EDGE, funded from the European Union's Horizon 2020 H2020-ICT-52 call for projects, under grant agreement no. 101015922. This research is funded in part, by the Luxembourg National Research Fund (FNR), grant reference C23/IS/18088425/COCTEL. 
The views expressed in this document do not necessarily reflect those of the Bank of Canada's Governing Council.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

